Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5696 (GCVE-0-2016-5696)
Vulnerability from cvelistv5
Published
2016-08-06 20:00
Modified
2024-08-06 01:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:08:00.657Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Gnoxter/mountain_goat" }, { "name": "USN-3070-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "name": "RHSA-2016:1657", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1814", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "name": "91704", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91704" }, { "name": "USN-3070-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "name": "USN-3070-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "name": "RHSA-2016:1815", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "name": "RHSA-2016:1939", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "name": "USN-3071-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "name": "RHSA-2016:1632", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "USN-3070-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "name": "1036625", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036625" }, { "name": "RHSA-2016:1631", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "name": "USN-3072-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "name": "RHSA-2016:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "name": "RHSA-2016:1664", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "name": "USN-3072-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "name": "[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "name": "USN-3071-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-07-12T00:00:00", "descriptions": [ { "lang": "en", "value": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T17:29:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Gnoxter/mountain_goat" }, { "name": "USN-3070-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "name": "RHSA-2016:1657", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1814", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "name": "91704", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91704" }, { "name": "USN-3070-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "name": "USN-3070-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "name": "RHSA-2016:1815", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "name": "RHSA-2016:1939", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "name": "USN-3071-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "name": "RHSA-2016:1632", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "USN-3070-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "name": "1036625", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036625" }, { "name": "RHSA-2016:1631", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "name": "USN-3072-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "name": "RHSA-2016:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "name": "RHSA-2016:1664", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "name": "USN-3072-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "name": "[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "name": "USN-3071-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "https://github.com/Gnoxter/mountain_goat", "refsource": "MISC", "url": "https://github.com/Gnoxter/mountain_goat" }, { "name": "USN-3070-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "name": "RHSA-2016:1657", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa131", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "name": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1814", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "name": "http://source.android.com/security/bulletin/2016-10-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "name": "91704", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91704" }, { "name": "USN-3070-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "name": "USN-3070-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "name": "RHSA-2016:1815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "name": "RHSA-2016:1939", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "name": "USN-3071-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "name": "RHSA-2016:1632", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "name": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf", "refsource": "MISC", "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "USN-3070-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "name": "1036625", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036625" }, { "name": "RHSA-2016:1631", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "name": "USN-3072-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "name": "RHSA-2016:1633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "name": "RHSA-2016:1664", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "name": "USN-3072-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "name": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html", "refsource": "MISC", "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "name": "[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "name": "USN-3071-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-5696", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-5696", "datePublished": "2016-08-06T20:00:00", "dateReserved": "2016-06-16T00:00:00", "dateUpdated": "2024-08-06T01:08:00.657Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-5696\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2016-08-06T20:59:05.690\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.\"},{\"lang\":\"es\",\"value\":\"net/ipv4/tcp_input.c en el kernel de Linux en versiones anteriores a 4.7 no determina adecuadamente la tasa de segmentos de desaf\u00edo ACK, lo que facilita a atacantes remotos secuestrar sesiones TCP a trav\u00e9s de un ataque ciego en ventana.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":2.5}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.0\",\"matchCriteriaId\":\"595E33EF-6B21-425B-929C-6B883FA50081\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87AE59F3-F47B-424D-B5EB-40768018206D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45DC1391-1EFC-49D7-9DD5-D9D9C5DFE746\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.6.6\",\"matchCriteriaId\":\"52847A0D-725D-40BB-B852-8937D886C0E1\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1631.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1632.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1633.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1657.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1664.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1814.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1815.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1939.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://source.android.com/security/bulletin/2016-10-01.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/07/12/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\"]},{\"url\":\"http://www.securityfocus.com/bid/91704\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1036625\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-3\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-4\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3071-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3071-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3072-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3072-2\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa131\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1354708\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/Gnoxter/mountain_goat\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-5696\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1631.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1632.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1633.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1657.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1664.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1814.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1815.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1939.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://source.android.com/security/bulletin/2016-10-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/07/12/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]},{\"url\":\"http://www.securityfocus.com/bid/91704\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036625\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3070-4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3071-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3071-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3072-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-3072-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1354708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/Gnoxter/mountain_goat\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-5696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\"]}]}}" } }
suse-su-2017:0471-1
Vulnerability from csaf_suse
Published
2017-02-15 16:20
Modified
2017-02-15 16:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.
The following feature was implemented:
- The ext2 filesystem got reenabled and supported to allow support for 'XIP' (Execute In Place) (FATE#320805).
The following security bugs were fixed:
- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
The following non-security bugs were fixed:
- base: make module_create_drivers_dir race-free (bnc#983977).
- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs in tuning.
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)
- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: reintroduce sk_filter (kabi).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- netfilter: allow logging fron non-init netns (bsc#970083).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- reiserfs: fix race in prealloc discard (bsc#987576).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: Increase REPORT_LUNS timeout (bsc#982282).
- series.conf: move stray netfilter patches to the right section
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- supported.conf: Add ext2
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tty: audit: Fix audit source (bsc#1016482).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nThe following feature was implemented:\n\n- The ext2 filesystem got reenabled and supported to allow support for \u0027XIP\u0027 (Execute In Place) (FATE#320805).\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).\n- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).\n- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \u0027state machine confusion bug (bnc#1007197).\n- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n\nThe following non-security bugs were fixed:\n\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- btrfs: increment ctx-\u003epos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- ext4: Fixup handling for custom configs in tuning.\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)\n- ipv6: KABI workaround for ipv6: add complete rcu protection around np-\u003eopt.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: reintroduce sk_filter (kabi).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: Increase REPORT_LUNS timeout (bsc#982282).\n- series.conf: move stray netfilter patches to the right section\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- supported.conf: Add ext2\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tty: audit: Fix audit source (bsc#1016482).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0471-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0471-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0471-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1007197", "url": "https://bugzilla.suse.com/1007197" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008979", "url": "https://bugzilla.suse.com/1008979" }, { "category": "self", "summary": "SUSE Bug 1009969", "url": "https://bugzilla.suse.com/1009969" }, { "category": "self", "summary": "SUSE Bug 1010040", "url": "https://bugzilla.suse.com/1010040" }, { "category": "self", "summary": "SUSE Bug 1010475", "url": "https://bugzilla.suse.com/1010475" }, { "category": "self", "summary": "SUSE Bug 1010478", "url": "https://bugzilla.suse.com/1010478" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010502", "url": "https://bugzilla.suse.com/1010502" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013540", "url": "https://bugzilla.suse.com/1013540" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1016482", "url": "https://bugzilla.suse.com/1016482" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017589", "url": "https://bugzilla.suse.com/1017589" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019300", "url": "https://bugzilla.suse.com/1019300" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 881008", "url": "https://bugzilla.suse.com/881008" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 958606", "url": "https://bugzilla.suse.com/958606" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 970083", "url": "https://bugzilla.suse.com/970083" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980560", "url": "https://bugzilla.suse.com/980560" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 981709", "url": "https://bugzilla.suse.com/981709" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 986941", "url": "https://bugzilla.suse.com/986941" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 990384", "url": "https://bugzilla.suse.com/990384" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994748", "url": "https://bugzilla.suse.com/994748" }, { "category": "self", "summary": "SUSE Bug 994881", "url": "https://bugzilla.suse.com/994881" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE Bug 999943", "url": "https://bugzilla.suse.com/999943" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8963 page", "url": "https://www.suse.com/security/cve/CVE-2015-8963/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7914 page", "url": "https://www.suse.com/security/cve/CVE-2016-7914/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8645 page", "url": "https://www.suse.com/security/cve/CVE-2016-8645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9083 page", "url": "https://www.suse.com/security/cve/CVE-2016-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9084 page", "url": "https://www.suse.com/security/cve/CVE-2016-9084/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9806 page", "url": "https://www.suse.com/security/cve/CVE-2016-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-15T16:20:32Z", "generator": { "date": "2017-02-15T16:20:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0471-1", "initial_release_date": "2017-02-15T16:20:32Z", "revision_history": [ { "date": "2017-02-15T16:20:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.66.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.66.1.noarch", "product_id": "kernel-devel-3.12.61-52.66.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.66.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.66.1.noarch", "product_id": "kernel-macros-3.12.61-52.66.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.66.1.noarch", "product": { "name": "kernel-source-3.12.61-52.66.1.noarch", "product_id": "kernel-source-3.12.61-52.66.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.66.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.66.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-3.12.61-52.66.1.s390x", "product_id": "kernel-default-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.66.1.s390x", "product_id": "kernel-default-base-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.66.1.s390x", "product_id": "kernel-default-man-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.66.1.s390x", "product_id": "kernel-syms-3.12.61-52.66.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.66.1.x86_64", "product_id": "kernel-syms-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8963" } ], "notes": [ { "category": "general", "text": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8963", "url": "https://www.suse.com/security/cve/CVE-2015-8963" }, { "category": "external", "summary": "SUSE Bug 1010502 for CVE-2015-8963", "url": "https://bugzilla.suse.com/1010502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2015-8963" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-7914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7914" } ], "notes": [ { "category": "general", "text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7914", "url": "https://www.suse.com/security/cve/CVE-2016-7914" }, { "category": "external", "summary": "SUSE Bug 1010475 for CVE-2016-7914", "url": "https://bugzilla.suse.com/1010475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-7914" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8645" } ], "notes": [ { "category": "general", "text": "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8645", "url": "https://www.suse.com/security/cve/CVE-2016-8645" }, { "category": "external", "summary": "SUSE Bug 1009969 for CVE-2016-8645", "url": "https://bugzilla.suse.com/1009969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8645" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-8658" }, { "cve": "CVE-2016-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9083" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9083", "url": "https://www.suse.com/security/cve/CVE-2016-9083" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9083", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-9083" }, { "cve": "CVE-2016-9084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9084" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9084", "url": "https://www.suse.com/security/cve/CVE-2016-9084" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9084", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-9084" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9806" } ], "notes": [ { "category": "general", "text": "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9806", "url": "https://www.suse.com/security/cve/CVE-2016-9806" }, { "category": "external", "summary": "SUSE Bug 1013540 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1013540" }, { "category": "external", "summary": "SUSE Bug 1017589 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1017589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-9806" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2017:0437-1
Vulnerability from csaf_suse
Published
2017-02-09 15:37
Modified
2017-02-09 15:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations
or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device
NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers
and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST
packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr
operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial
of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove
a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or
cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability
(bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local
malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
because it first requires compromising a privileged process and current compiler optimizations restrict access to the
vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain
error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted
application (bnc#1013038).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users
to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel
allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching
a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking
for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or
possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel
allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the
corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local
users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call
(bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of
service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users
to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users
to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time
interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a
denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero
bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote
attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
The following non-security bugs were fixed:
- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- KABI fix (bsc#1014410).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387).
- dm: do not call dm_sync_table() when creating new devices (bnc#901809).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- ibmveth: calculate gso_segs for large packets (bsc#1019165).
- ibmveth: set correct gso_size and gso_type (bsc#1019165).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).
- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).
- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).
- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).
- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).
- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).
- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).
- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).
- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).
- netfront: do not truncate grant references.
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).
- scsi: Fix erratic device offline during EH (bsc#993832).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Fix temperature reporting (bnc#790588 FATE#313912).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- xenbus: do not invoke is_ready() for most device states (bsc#987333).
Patchnames
sdksp4-kernel-12977,slessp4-kernel-12977,slexsp3-kernel-12977
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-94 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: tmpfs: clear S_ISGID when setting posix ACLs (bsc#1021258).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations\n where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations\n or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device\n NOTE: this vulnerability existed because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers\n and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST\n packet, especially in protocols that use long-lived connections, such as BGP (bnc#989152).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provided an incomplete set of requirements for setattr\n operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial\n of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove\n a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship\n between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or\n cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability\n (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local\n malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate\n because it first requires compromising a privileged process and current compiler optimizations restrict access to the\n vulnerable code. (bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of\n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of\n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain\n error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted\n application (bnc#1013038).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users\n to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel\n allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching\n a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking\n for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or\n possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel\n allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the\n corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local\n users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call\n (bnc#1010711).\n- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of\n service (system crash) via a VAPIC synchronization operation involving a page-end address (bnc#853052).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users\n to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users\n to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time\n interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a\n denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero\n bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel, in certain unusual hardware configurations, allowed remote\n attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n\nThe following non-security bugs were fixed:\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).\n- KABI fix (bsc#1014410).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- be2net: Do not leak iomapped memory on removal (bug#925065).\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- crypto: add ghash-generic in the supported.conf(bsc#1016824)\n- crypto: aesni - Add support for 192 \u0026 256 bit keys to AESNI RFC4106 (bsc#913387).\n- dm: do not call dm_sync_table() when creating new devices (bnc#901809).\n- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)\n- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).\n- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).\n- ext4: fix reference counting bug on block allocation error (bsc#1013018).\n- futex: Acknowledge a new waiter in counter before plist (bsc#851603).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).\n- hpilo: Add support for iLO5 (bsc#999101).\n- ibmveth: calculate gso_segs for large packets (bsc#1019165).\n- ibmveth: set correct gso_size and gso_type (bsc#1019165).\n- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491 FATE#317388).\n- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297 FATE#313656).\n- igb: Fix oops caused by missing queue pairing (bsc#909491 FATE#317388).\n- igb: Fix oops on changing number of rings (bsc#909491 FATE#317388).\n- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491 FATE#317388).\n- igb: Unpair the queues when changing the number of queues (bsc#909491 FATE#317388).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).\n- kvm: Distangle eventfd code from irqchip (bsc#989680).\n- kvm: Iterate over only vcpus that are preempted (bsc#989680).\n- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).\n- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).\n- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).\n- kvm: make processes waiting on vcpu mutex killable (bsc#989680).\n- kvm: nVMX: Add preemption timer support (bsc#989680).\n- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).\n- kvm: use symbolic constant for nr interrupts (bsc#989680).\n- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).\n- kvm: x86: Run PIT work in own kthread (bsc#989680).\n- kvm: x86: limit difference between kvmclock updates (bsc#989680).\n- libata: introduce ata_host-\u003en_tags to avoid oops on SAS controllers (bsc#871728).\n- libata: remove n_tags to avoid kABI breakage (bsc#871728).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: Update rport reference counting (bsc#953233).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).\n- memstick: mspro_block: add missing curly braces (bsc#1016688).\n- mlx4: Fix error flow when sending mads under SRIOV (bsc#786036 FATE#314304).\n- mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036 FATE#314304).\n- mlx4: Fix memory leak if QP creation failed (bsc#786036 FATE#314304).\n- mlx4: Fix potential deadlock when sending mad to wire (bsc#786036 FATE#314304).\n- mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036 FATE#314304).\n- mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036 FATE#314304).\n- mlx4: add missing braces in verify_qp_parameters (bsc#786036 FATE#314304).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).\n- mm: fix crashes from mbind() merging vmas (bnc#1005877).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).\n- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036 FATE#314304).\n- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382 FATE#317529).\n- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036 FATE#314304).\n- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).\n- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708).\n- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bsc#919382 FATE#317529).\n- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036 FATE#314304).\n- net/mlx4_core: Implement pci_resume callback (bsc#924708).\n- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382 FATE#317529).\n- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382 FATE#317529).\n- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382 FATE#317529).\n- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036 FATE#314304).\n- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036 FATE#314304).\n- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382 FATE#317529).\n- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382 FATE#317529).\n- netfront: do not truncate grant references.\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).\n- nvme: Automatic namespace rescan (bsc#1017686).\n- nvme: Metadata format support (bsc#1017686).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- powerpc: fix typo \u0027CONFIG_PPC_CPU\u0027 (bsc#1010201).\n- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#996541).\n- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- qlcnic: fix a loop exit condition better (bsc#909350 FATE#317546).\n- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999 FATE#313899).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).\n- s390/zcrypt: kernel: Fix invalid domain response handling (bsc#1016320).\n- scsi: Fix erratic device offline during EH (bsc#993832).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832).\n- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- tg3: Fix temperature reporting (bnc#790588 FATE#313912).\n- usb: console: fix potential use after free (bsc#1015817).\n- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).\n- usb: cp210x: Corrected USB request type definitions (bsc#1015932).\n- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).\n- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).\n- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).\n- usb: ipaq.c: fix a timeout loop (bsc#1015848).\n- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).\n- usb: option: fix runtime PM handling (bsc#1015752).\n- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).\n- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).\n- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).\n- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).\n- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).\n- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).\n- usb: sierra: fix AA deadlock in open error path (bsc#1015561).\n- usb: sierra: fix remote wakeup (bsc#1015561).\n- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).\n- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).\n- usb: sierra: fix use after free at suspend/resume (bsc#1015561).\n- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).\n- usb: usb_wwan: fix race between write and resume (bsc#1015760).\n- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).\n- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).\n- usb: usb_wwan: fix write and suspend race (bsc#1015760).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).\n- xenbus: do not invoke is_ready() for most device states (bsc#987333).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-12977,slessp4-kernel-12977,slexsp3-kernel-12977", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0437-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0437-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170437-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0437-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002637.html" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1005877", "url": "https://bugzilla.suse.com/1005877" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008893", "url": "https://bugzilla.suse.com/1008893" }, { "category": "self", "summary": "SUSE Bug 1009875", "url": "https://bugzilla.suse.com/1009875" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010175", "url": "https://bugzilla.suse.com/1010175" }, { "category": "self", "summary": "SUSE Bug 1010201", "url": "https://bugzilla.suse.com/1010201" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010713", "url": "https://bugzilla.suse.com/1010713" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012183", "url": "https://bugzilla.suse.com/1012183" }, { "category": "self", "summary": "SUSE Bug 1012411", "url": "https://bugzilla.suse.com/1012411" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1012851", "url": "https://bugzilla.suse.com/1012851" }, { "category": "self", "summary": "SUSE Bug 1012852", "url": "https://bugzilla.suse.com/1012852" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013042", "url": "https://bugzilla.suse.com/1013042" }, { "category": "self", "summary": "SUSE Bug 1013070", "url": "https://bugzilla.suse.com/1013070" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014454", "url": "https://bugzilla.suse.com/1014454" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1015561", "url": "https://bugzilla.suse.com/1015561" }, { "category": "self", "summary": "SUSE Bug 1015752", "url": "https://bugzilla.suse.com/1015752" }, { "category": "self", "summary": "SUSE Bug 1015760", "url": "https://bugzilla.suse.com/1015760" }, { "category": "self", "summary": "SUSE Bug 1015796", "url": "https://bugzilla.suse.com/1015796" }, { "category": "self", "summary": "SUSE Bug 1015803", "url": "https://bugzilla.suse.com/1015803" }, { "category": "self", "summary": "SUSE Bug 1015817", "url": "https://bugzilla.suse.com/1015817" }, { "category": "self", "summary": "SUSE Bug 1015828", "url": "https://bugzilla.suse.com/1015828" }, { "category": "self", "summary": "SUSE Bug 1015844", "url": "https://bugzilla.suse.com/1015844" }, { "category": "self", "summary": "SUSE Bug 1015848", "url": "https://bugzilla.suse.com/1015848" }, { "category": "self", "summary": "SUSE Bug 1015878", "url": "https://bugzilla.suse.com/1015878" }, { "category": "self", "summary": "SUSE Bug 1015932", "url": "https://bugzilla.suse.com/1015932" }, { "category": "self", "summary": "SUSE Bug 1016320", "url": "https://bugzilla.suse.com/1016320" }, { "category": "self", "summary": "SUSE Bug 1016505", "url": "https://bugzilla.suse.com/1016505" }, { "category": "self", "summary": "SUSE Bug 1016520", "url": "https://bugzilla.suse.com/1016520" }, { "category": "self", "summary": "SUSE Bug 1016668", "url": "https://bugzilla.suse.com/1016668" }, { "category": "self", "summary": "SUSE Bug 1016688", "url": "https://bugzilla.suse.com/1016688" }, { "category": "self", "summary": "SUSE Bug 1016824", "url": "https://bugzilla.suse.com/1016824" }, { "category": "self", "summary": "SUSE Bug 1016831", "url": "https://bugzilla.suse.com/1016831" }, { "category": "self", "summary": "SUSE Bug 1017686", "url": "https://bugzilla.suse.com/1017686" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019079", "url": "https://bugzilla.suse.com/1019079" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019165", "url": "https://bugzilla.suse.com/1019165" }, { "category": "self", "summary": "SUSE Bug 1019348", "url": "https://bugzilla.suse.com/1019348" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 748806", "url": "https://bugzilla.suse.com/748806" }, { "category": "self", "summary": "SUSE Bug 786036", "url": "https://bugzilla.suse.com/786036" }, { "category": "self", "summary": "SUSE Bug 790588", "url": "https://bugzilla.suse.com/790588" }, { "category": "self", "summary": "SUSE Bug 795297", "url": "https://bugzilla.suse.com/795297" }, { "category": "self", "summary": "SUSE Bug 800999", "url": "https://bugzilla.suse.com/800999" }, { "category": "self", "summary": "SUSE Bug 821612", "url": "https://bugzilla.suse.com/821612" }, { "category": "self", "summary": "SUSE Bug 824171", "url": "https://bugzilla.suse.com/824171" }, { "category": "self", "summary": "SUSE Bug 851603", "url": "https://bugzilla.suse.com/851603" }, { "category": "self", "summary": "SUSE Bug 853052", "url": "https://bugzilla.suse.com/853052" }, { "category": "self", "summary": "SUSE Bug 871728", "url": "https://bugzilla.suse.com/871728" }, { "category": "self", "summary": "SUSE Bug 901809", "url": "https://bugzilla.suse.com/901809" }, { "category": "self", "summary": "SUSE Bug 909350", "url": "https://bugzilla.suse.com/909350" }, { "category": "self", "summary": "SUSE Bug 909491", "url": "https://bugzilla.suse.com/909491" }, { "category": "self", "summary": "SUSE Bug 913387", "url": "https://bugzilla.suse.com/913387" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 919382", "url": "https://bugzilla.suse.com/919382" }, { "category": "self", "summary": "SUSE Bug 924708", "url": "https://bugzilla.suse.com/924708" }, { "category": "self", "summary": "SUSE Bug 925065", "url": "https://bugzilla.suse.com/925065" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 961589", "url": "https://bugzilla.suse.com/961589" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 973691", "url": "https://bugzilla.suse.com/973691" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989680", "url": "https://bugzilla.suse.com/989680" }, { "category": "self", "summary": "SUSE Bug 989896", "url": "https://bugzilla.suse.com/989896" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 992991", "url": "https://bugzilla.suse.com/992991" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE Bug 996541", "url": "https://bugzilla.suse.com/996541" }, { "category": "self", "summary": "SUSE Bug 996557", "url": "https://bugzilla.suse.com/996557" }, { "category": "self", "summary": "SUSE Bug 997401", "url": "https://bugzilla.suse.com/997401" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6368 page", "url": "https://www.suse.com/security/cve/CVE-2013-6368/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-09T15:37:43Z", "generator": { "date": "2017-02-09T15:37:43Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0437-1", "initial_release_date": "2017-02-09T15:37:43Z", "revision_history": [ { "date": "2017-02-09T15:37:43Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.i586", "product": { "name": "kernel-default-3.0.101-94.1.i586", "product_id": "kernel-default-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.i586", "product": { "name": "kernel-default-base-3.0.101-94.1.i586", "product_id": "kernel-default-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.i586", "product": { "name": "kernel-default-devel-3.0.101-94.1.i586", "product_id": "kernel-default-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-94.1.i586", "product": { "name": "kernel-ec2-3.0.101-94.1.i586", "product_id": "kernel-ec2-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-94.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-94.1.i586", "product_id": "kernel-ec2-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-94.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-94.1.i586", "product_id": "kernel-ec2-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-94.1.i586", "product": { "name": "kernel-pae-3.0.101-94.1.i586", "product_id": "kernel-pae-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-94.1.i586", "product": { "name": "kernel-pae-base-3.0.101-94.1.i586", "product_id": "kernel-pae-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-94.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-94.1.i586", "product_id": "kernel-pae-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.i586", "product": { "name": "kernel-source-3.0.101-94.1.i586", "product_id": "kernel-source-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.i586", "product": { "name": "kernel-syms-3.0.101-94.1.i586", "product_id": "kernel-syms-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.i586", "product": { "name": "kernel-trace-3.0.101-94.1.i586", "product_id": "kernel-trace-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.i586", "product": { "name": "kernel-trace-base-3.0.101-94.1.i586", "product_id": "kernel-trace-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-94.1.i586", "product_id": "kernel-trace-devel-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-94.1.i586", "product": { "name": "kernel-xen-3.0.101-94.1.i586", "product_id": "kernel-xen-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-94.1.i586", "product": { "name": "kernel-xen-base-3.0.101-94.1.i586", "product_id": "kernel-xen-base-3.0.101-94.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-94.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-94.1.i586", "product_id": "kernel-xen-devel-3.0.101-94.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.ia64", "product": { "name": "kernel-default-3.0.101-94.1.ia64", "product_id": "kernel-default-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.ia64", "product": { "name": "kernel-default-base-3.0.101-94.1.ia64", "product_id": "kernel-default-base-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-94.1.ia64", "product_id": "kernel-default-devel-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.ia64", "product": { "name": "kernel-source-3.0.101-94.1.ia64", "product_id": "kernel-source-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.ia64", "product": { "name": "kernel-syms-3.0.101-94.1.ia64", "product_id": "kernel-syms-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.ia64", "product": { "name": "kernel-trace-3.0.101-94.1.ia64", "product_id": "kernel-trace-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-94.1.ia64", "product_id": "kernel-trace-base-3.0.101-94.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-94.1.ia64", "product_id": "kernel-trace-devel-3.0.101-94.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-94.2.noarch", "product": { "name": "kernel-docs-3.0.101-94.2.noarch", "product_id": "kernel-docs-3.0.101-94.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-94.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-94.1.ppc64", "product_id": "kernel-bigmem-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-94.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-94.1.ppc64", "product": { "name": "kernel-default-3.0.101-94.1.ppc64", "product_id": "kernel-default-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-94.1.ppc64", "product_id": "kernel-default-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-94.1.ppc64", "product_id": "kernel-default-devel-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-94.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-94.1.ppc64", "product_id": "kernel-ppc64-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-94.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.ppc64", "product": { "name": "kernel-source-3.0.101-94.1.ppc64", "product_id": "kernel-source-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.ppc64", "product": { "name": "kernel-syms-3.0.101-94.1.ppc64", "product_id": "kernel-syms-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.ppc64", "product": { "name": "kernel-trace-3.0.101-94.1.ppc64", "product_id": "kernel-trace-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-94.1.ppc64", "product_id": "kernel-trace-base-3.0.101-94.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-94.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-94.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.s390x", "product": { "name": "kernel-default-3.0.101-94.1.s390x", "product_id": "kernel-default-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.s390x", "product": { "name": "kernel-default-base-3.0.101-94.1.s390x", "product_id": "kernel-default-base-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-94.1.s390x", "product_id": "kernel-default-devel-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-94.1.s390x", "product": { "name": "kernel-default-man-3.0.101-94.1.s390x", "product_id": "kernel-default-man-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.s390x", "product": { "name": "kernel-source-3.0.101-94.1.s390x", "product_id": "kernel-source-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.s390x", "product": { "name": "kernel-syms-3.0.101-94.1.s390x", "product_id": "kernel-syms-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.s390x", "product": { "name": "kernel-trace-3.0.101-94.1.s390x", "product_id": "kernel-trace-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-94.1.s390x", "product_id": "kernel-trace-base-3.0.101-94.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-94.1.s390x", "product_id": "kernel-trace-devel-3.0.101-94.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-94.1.x86_64", "product": { "name": "kernel-default-3.0.101-94.1.x86_64", "product_id": "kernel-default-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-94.1.x86_64", "product_id": "kernel-default-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-94.1.x86_64", "product_id": "kernel-default-devel-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-94.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-94.1.x86_64", "product_id": "kernel-ec2-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-94.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-94.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-94.1.x86_64", "product": { "name": "kernel-source-3.0.101-94.1.x86_64", "product_id": "kernel-source-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-94.1.x86_64", "product": { "name": "kernel-syms-3.0.101-94.1.x86_64", "product_id": "kernel-syms-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-94.1.x86_64", "product": { "name": "kernel-trace-3.0.101-94.1.x86_64", "product_id": "kernel-trace-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-94.1.x86_64", "product_id": "kernel-trace-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-94.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-94.1.x86_64", "product": { "name": "kernel-xen-3.0.101-94.1.x86_64", "product_id": "kernel-xen-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-94.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-94.1.x86_64", "product_id": "kernel-xen-base-3.0.101-94.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-94.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-94.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-94.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-94.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" }, "product_reference": "kernel-docs-3.0.101-94.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586" }, "product_reference": "kernel-default-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586" }, "product_reference": "kernel-default-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586" }, "product_reference": "kernel-source-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64" }, "product_reference": "kernel-source-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64" }, "product_reference": "kernel-source-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x" }, "product_reference": "kernel-source-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64" }, "product_reference": "kernel-source-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586" }, "product_reference": "kernel-syms-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64" }, "product_reference": "kernel-syms-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x" }, "product_reference": "kernel-syms-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586" }, "product_reference": "kernel-default-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586" }, "product_reference": "kernel-default-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586" }, "product_reference": "kernel-source-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64" }, "product_reference": "kernel-source-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64" }, "product_reference": "kernel-source-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x" }, "product_reference": "kernel-source-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64" }, "product_reference": "kernel-source-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586" }, "product_reference": "kernel-syms-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64" }, "product_reference": "kernel-syms-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x" }, "product_reference": "kernel-syms-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-94.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-94.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-6368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6368" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6368", "url": "https://www.suse.com/security/cve/CVE-2013-6368" }, { "category": "external", "summary": "SUSE Bug 853052 for CVE-2013-6368", "url": "https://bugzilla.suse.com/853052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2013-6368" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-94.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-94.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2017-02-09T15:37:43Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:3069-1
Vulnerability from csaf_suse
Published
2016-12-09 13:20
Modified
2016-12-09 13:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
This feature was added:
- Support for the 2017 Intel Purley platform.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
The following non-security bugs were fixed:
- ahci: Order SATA device IDs for codename Lewisburg.
- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.
- ALSA: hda - Add Intel Lewisburg device IDs Audio.
- avoid dentry crash triggered by NFS (bsc#984194).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- fs/select: introduce SIZE_MAX (bsc#1000189).
- i2c: i801: add Intel Lewisburg device IDs.
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -> 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- md: lockless I/O submission for RAID1 (bsc#982783).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Don't disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Don't write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- random32: add prandom_u32_max (bsc#989152).
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- s390/dasd: fix hanging device after clear subchannel (bnc#994436).
- sata: Adding Intel Lewisburg device IDs for SATA.
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: don't deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
Patchnames
slertesp4-kernel-source-12880
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThis feature was added:\n\n- Support for the 2017 Intel Purley platform. \n\nThe following security bugs were fixed:\n\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n\nThe following non-security bugs were fixed:\n\n- ahci: Order SATA device IDs for codename Lewisburg.\n- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.\n- ALSA: hda - Add Intel Lewisburg device IDs Audio.\n- avoid dentry crash triggered by NFS (bsc#984194).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).\n- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- fs/select: introduce SIZE_MAX (bsc#1000189).\n- i2c: i801: add Intel Lewisburg device IDs.\n- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).\n- increase CONFIG_NR_IRQS 512 -\u003e 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- KVM: x86: SYSENTER emulation is broken (bsc#994618).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).\n- netback: fix flipping mode (bsc#996664).\n- nfs: Do not drop directory dentry which is in use (bsc#993127).\n- nfs: Don\u0027t disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Don\u0027t write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).\n- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).\n- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).\n- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).\n- pciback: fix conf_space read/write overlap check.\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- random32: add prandom_u32_max (bsc#989152).\n- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436).\n- sata: Adding Intel Lewisburg device IDs for SATA.\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#984102).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).\n- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).\n- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).\n- USB: fix typo in wMaxPacketSize validation (bsc#991665).\n- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vlan: don\u0027t deliver frames for unknown vlans to protocols (bsc#979514).\n- vlan: mask vlan prio bits (bsc#979514).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-source-12880", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3069-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3069-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163069-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3069-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 732582", "url": "https://bugzilla.suse.com/732582" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 843236", "url": "https://bugzilla.suse.com/843236" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 934760", "url": "https://bugzilla.suse.com/934760" }, { "category": "self", "summary": "SUSE Bug 951392", "url": "https://bugzilla.suse.com/951392" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 976867", "url": "https://bugzilla.suse.com/976867" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 979514", "url": "https://bugzilla.suse.com/979514" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 982218", "url": "https://bugzilla.suse.com/982218" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984102", "url": "https://bugzilla.suse.com/984102" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985206", "url": "https://bugzilla.suse.com/985206" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 989779", "url": "https://bugzilla.suse.com/989779" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991923", "url": "https://bugzilla.suse.com/991923" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993127", "url": "https://bugzilla.suse.com/993127" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 994926", "url": "https://bugzilla.suse.com/994926" }, { "category": "self", "summary": "SUSE Bug 996329", "url": "https://bugzilla.suse.com/996329" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998399", "url": "https://bugzilla.suse.com/998399" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-09T13:20:33Z", "generator": { "date": "2016-12-09T13:20:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3069-1", "initial_release_date": "2016-12-09T13:20:33Z", "revision_history": [ { "date": "2016-12-09T13:20:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-7425" } ] }
suse-su-2016:3304-1
Vulnerability from csaf_suse
Published
2016-12-30 13:09
Modified
2016-12-30 13:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.
This feature was added:
- fate#320805: Execute in place (XIP) support for the ext2 filesystem.
The following security bugs were fixed:
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542)
- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).
- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784 FATE#318561).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size().
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.
- bonding: Prevent IPv6 link local address on enslaved devices.
- bonding: prevent out of bound accesses.
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the 'request', not the 'response' (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195).
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- msi-x: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oops on restarting network with bonding mode4 (lacp) (bsc#876145).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays.
- RTNL: assertion failed at dev.c (bsc#875631).
- s390: add SMT support (bnc#994438).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- SUNRPC: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set.
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: Check if slot is already in default state before moving it there (FATE#315518).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThis feature was added:\n\n- fate#320805: Execute in place (XIP) support for the ext2 filesystem.\n\nThe following security bugs were fixed:\n\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542)\n- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can\u0027t wake up.\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don\u0027t check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don\u0027t leak iomapped memory on removal (bsc#921784 FATE#318561).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).\n- be2net: remove vlan promisc capability from VF\u0027s profile descriptors (bsc#921784 FATE#318561).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size().\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.\n- bonding: Prevent IPv6 link local address on enslaved devices.\n- bonding: prevent out of bound accesses.\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader\u0027s use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the \u0027request\u0027, not the \u0027response\u0027 (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195).\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc-\u003ereq_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- msi-x: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don\u0027t truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oops on restarting network with bonding mode4 (lacp) (bsc#876145).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for \u0027cycles:p\u0027 and \u0027cycles:pp\u0027 on SLM (bsc#997896).\n- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup-\u003ereserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- Revert \u0027Input: i8042 - break load dependency between atkbd/psmouse and i8042\u0027.\n- Revert \u0027Input: i8042 - set up shared ps2_cmd_mutex for AUX ports\u0027.\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays.\n- RTNL: assertion failed at dev.c (bsc#875631).\n- s390: add SMT support (bnc#994438).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- SUNRPC: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set.\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don\u0027t invoke -\u003eis_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: Check if slot is already in default state before moving it there (FATE#315518).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2016-1938", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3304-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3304-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163304-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3304-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1000287", "url": "https://bugzilla.suse.com/1000287" }, { "category": "self", "summary": "SUSE Bug 1000304", "url": "https://bugzilla.suse.com/1000304" }, { "category": "self", "summary": "SUSE Bug 1000776", "url": "https://bugzilla.suse.com/1000776" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1001486", "url": "https://bugzilla.suse.com/1001486" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003079", "url": "https://bugzilla.suse.com/1003079" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003400", "url": "https://bugzilla.suse.com/1003400" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004252", "url": "https://bugzilla.suse.com/1004252" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1006691", "url": "https://bugzilla.suse.com/1006691" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1007886", "url": "https://bugzilla.suse.com/1007886" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 857397", "url": "https://bugzilla.suse.com/857397" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 865545", "url": "https://bugzilla.suse.com/865545" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 868923", "url": "https://bugzilla.suse.com/868923" }, { "category": "self", "summary": "SUSE Bug 874131", "url": "https://bugzilla.suse.com/874131" }, { "category": "self", "summary": "SUSE Bug 875631", "url": "https://bugzilla.suse.com/875631" }, { "category": "self", "summary": "SUSE Bug 876145", "url": "https://bugzilla.suse.com/876145" }, { "category": "self", "summary": "SUSE Bug 876463", "url": "https://bugzilla.suse.com/876463" }, { "category": "self", "summary": "SUSE Bug 898675", "url": "https://bugzilla.suse.com/898675" }, { "category": "self", "summary": "SUSE Bug 904489", "url": "https://bugzilla.suse.com/904489" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921784", "url": "https://bugzilla.suse.com/921784" }, { "category": "self", "summary": "SUSE Bug 922064", "url": "https://bugzilla.suse.com/922064" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 924384", "url": "https://bugzilla.suse.com/924384" }, { "category": "self", "summary": "SUSE Bug 930399", "url": "https://bugzilla.suse.com/930399" }, { "category": "self", "summary": "SUSE Bug 934067", "url": "https://bugzilla.suse.com/934067" }, { "category": "self", "summary": "SUSE Bug 937086", "url": "https://bugzilla.suse.com/937086" }, { "category": "self", "summary": "SUSE Bug 937888", "url": "https://bugzilla.suse.com/937888" }, { "category": "self", "summary": "SUSE Bug 941420", "url": "https://bugzilla.suse.com/941420" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 955446", "url": "https://bugzilla.suse.com/955446" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 959463", "url": "https://bugzilla.suse.com/959463" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 966864", "url": "https://bugzilla.suse.com/966864" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 970943", "url": "https://bugzilla.suse.com/970943" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974406", "url": "https://bugzilla.suse.com/974406" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 975596", "url": "https://bugzilla.suse.com/975596" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 979451", "url": "https://bugzilla.suse.com/979451" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979928", "url": "https://bugzilla.suse.com/979928" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984779", "url": "https://bugzilla.suse.com/984779" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985562", "url": "https://bugzilla.suse.com/985562" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987621", "url": "https://bugzilla.suse.com/987621" }, { "category": "self", "summary": "SUSE Bug 987805", "url": "https://bugzilla.suse.com/987805" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 988617", "url": "https://bugzilla.suse.com/988617" }, { "category": "self", "summary": "SUSE Bug 988715", "url": "https://bugzilla.suse.com/988715" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989953", "url": "https://bugzilla.suse.com/989953" }, { "category": "self", "summary": "SUSE Bug 990058", "url": "https://bugzilla.suse.com/990058" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 991247", "url": "https://bugzilla.suse.com/991247" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE Bug 992244", "url": "https://bugzilla.suse.com/992244" }, { "category": "self", "summary": "SUSE Bug 992555", "url": "https://bugzilla.suse.com/992555" }, { "category": "self", "summary": "SUSE Bug 992568", "url": "https://bugzilla.suse.com/992568" }, { "category": "self", "summary": "SUSE Bug 992591", "url": "https://bugzilla.suse.com/992591" }, { "category": "self", "summary": "SUSE Bug 992593", "url": "https://bugzilla.suse.com/992593" }, { "category": "self", "summary": "SUSE Bug 992712", "url": "https://bugzilla.suse.com/992712" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993841", "url": "https://bugzilla.suse.com/993841" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994167", "url": "https://bugzilla.suse.com/994167" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994438", "url": "https://bugzilla.suse.com/994438" }, { "category": "self", "summary": "SUSE Bug 994520", "url": "https://bugzilla.suse.com/994520" }, { "category": "self", "summary": "SUSE Bug 994758", "url": "https://bugzilla.suse.com/994758" }, { "category": "self", "summary": "SUSE Bug 995153", "url": "https://bugzilla.suse.com/995153" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 997299", "url": "https://bugzilla.suse.com/997299" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 997896", "url": "https://bugzilla.suse.com/997896" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 998825", "url": "https://bugzilla.suse.com/998825" }, { "category": "self", "summary": "SUSE Bug 999577", "url": "https://bugzilla.suse.com/999577" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999779", "url": "https://bugzilla.suse.com/999779" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-30T13:09:04Z", "generator": { "date": "2016-12-30T13:09:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3304-1", "initial_release_date": "2016-12-30T13:09:04Z", "revision_history": [ { "date": "2016-12-30T13:09:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.67-60.27.1.noarch", "product": { "name": "kernel-devel-rt-3.12.67-60.27.1.noarch", "product_id": "kernel-devel-rt-3.12.67-60.27.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.67-60.27.1.noarch", "product": { "name": "kernel-source-rt-3.12.67-60.27.1.noarch", "product_id": "kernel-source-rt-3.12.67-60.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-base-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-base-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-base-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-base-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "product_id": "kernel-syms-rt-3.12.67-60.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.67-60.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch" }, "product_reference": "kernel-source-rt-3.12.67-60.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-2069" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-8658" } ] }
suse-su-2016:2976-1
Vulnerability from csaf_suse
Published
2016-12-02 11:04
Modified
2016-12-02 11:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
For the PowerPC64 a new 'bigmem' flavor has been added to support big Power machines. (FATE#319026)
The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).
The following non-security bugs were fixed:
- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).
- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).
- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- avoid dentry crash triggered by NFS (bsc#984194).
- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).
- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).
- drivers: hv: vss: run only on supported host versions (bnc#986337).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- i2c: i801: add Intel Lewisburg device IDs (fate#319286).
- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -> 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- introduce SIZE_MAX (bsc#1000189).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi: Import kabi files from 3.0.101-80
- kabi-fix for flock_owner addition (bsc#998689).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).
- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- oom: print nodemask in the oom report (bnc#1003866).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- pciback: return proper values during BAR sizing.
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC' obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)
- random32: add prandom_u32_max (bsc#989152).
- remove problematic preprocessor constructs (bsc#928138,fate#319026).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- rpm/package-descriptions: add -bigmem description
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: make executable
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).
- sort hyperv patches properly in series.conf
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).
- x86/gart: Check for GART support before accessing GART registers (fate#321400).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).
- zfcp: fix ELS/GS request&response length for hardware data router (bnc#1003677, LTC#144308).
- zfcp: fix payload trace length for SAN request&response (bnc#1003677, LTC#144312).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).
- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).
Patchnames
sdksp4-kernel-12869,slessp4-kernel-12869,slexsp3-kernel-12869
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nFor the PowerPC64 a new \u0027bigmem\u0027 flavor has been added to support big Power machines. (FATE#319026)\n\nThe following security bugs were fixed:\n\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).\n\nThe following non-security bugs were fixed:\n\n- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).\n- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).\n- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- config.conf: add bigmem flavour on ppc64\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).\n- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).\n- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).\n- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).\n- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).\n- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).\n- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).\n- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).\n- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).\n- drivers: hv: vss: run only on supported host versions (bnc#986337).\n- fs/cifs: cifs_get_root shouldn\u0027t use path with tree name (bsc#963655, bsc#979681).\n- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).\n- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).\n- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/cifs: make share unaccessible at root level mountable (bsc#799133).\n- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).\n- i2c: i801: add Intel Lewisburg device IDs (fate#319286).\n- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).\n- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).\n- increase CONFIG_NR_IRQS 512 -\u003e 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)\n- introduce SIZE_MAX (bsc#1000189).\n- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).\n- kabi: Import kabi files from 3.0.101-80\n- kabi-fix for flock_owner addition (bsc#998689).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).\n- kvm: x86: SYSENTER emulation is broken (bsc#994618).\n- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- lib/vsprintf: implement bitmap printing through \u0027%*pb[l]\u0027 (bnc#1003866).\n- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).\n- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: fix problem when adding device to read-only array with bitmap (bnc#771065).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).\n- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).\n- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).\n- mm/memory.c: actually remap enough memory (bnc#1005903).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).\n- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.\n- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mshyperv: fix recognition of Hyper-V guest crash MSR\u0027s (bnc#986337).\n- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).\n- netback: fix flipping mode (bsc#996664).\n- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).\n- netvsc: fix incorrect receive checksum offloading (bnc#1006917).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Do not drop directory dentry which is in use (bsc#993127).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).\n- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).\n- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).\n- oom: print nodemask in the oom report (bnc#1003866).\n- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).\n- pciback: fix conf_space read/write overlap check.\n- pciback: return proper values during BAR sizing.\n- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo \u0027CONFIG_PMAC\u0027 obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu\n- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).\n- powerpc/mm: Change the swap encoding in pte (bsc#973203).\n- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).\n- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).\n- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).\n- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).\n- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).\n- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).\n- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).\n- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).\n- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).\n- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).\n- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: Update kernel VSID range (bsc#928138,fate#319026).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)\n- random32: add prandom_u32_max (bsc#989152).\n- remove problematic preprocessor constructs (bsc#928138,fate#319026).\n- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.\n- rpm/package-descriptions: add -bigmem description\n- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).\n- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).\n- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).\n- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM\n- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM\n- scripts/bigmem-generate-ifdef-guard: make executable\n- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#984102).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).\n- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).\n- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).\n- sort hyperv patches properly in series.conf\n- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).\n- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).\n- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).\n- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).\n- vlan: mask vlan prio bits (bsc#979514).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).\n- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).\n- x86/gart: Check for GART support before accessing GART registers (fate#321400).\n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).\n- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).\n- zfcp: fix ELS/GS request\u0026response length for hardware data router (bnc#1003677, LTC#144308).\n- zfcp: fix payload trace length for SAN request\u0026response (bnc#1003677, LTC#144312).\n- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).\n- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).\n- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).\n- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).\n- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-12869,slessp4-kernel-12869,slexsp3-kernel-12869", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2976-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2976-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162976-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2976-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003344", "url": "https://bugzilla.suse.com/1003344" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003677", "url": "https://bugzilla.suse.com/1003677" }, { "category": "self", "summary": "SUSE Bug 1003866", "url": "https://bugzilla.suse.com/1003866" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005857", "url": "https://bugzilla.suse.com/1005857" }, { "category": "self", "summary": "SUSE Bug 1005896", "url": "https://bugzilla.suse.com/1005896" }, { "category": "self", "summary": "SUSE Bug 1005903", "url": "https://bugzilla.suse.com/1005903" }, { "category": "self", "summary": "SUSE Bug 1006917", "url": "https://bugzilla.suse.com/1006917" }, { "category": "self", "summary": "SUSE Bug 1006919", "url": "https://bugzilla.suse.com/1006919" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 763198", "url": "https://bugzilla.suse.com/763198" }, { "category": "self", "summary": "SUSE Bug 771065", "url": "https://bugzilla.suse.com/771065" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 803320", "url": "https://bugzilla.suse.com/803320" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 843236", "url": "https://bugzilla.suse.com/843236" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 865783", "url": "https://bugzilla.suse.com/865783" }, { "category": "self", "summary": "SUSE Bug 871728", "url": "https://bugzilla.suse.com/871728" }, { "category": "self", "summary": "SUSE Bug 907611", "url": "https://bugzilla.suse.com/907611" }, { "category": "self", "summary": "SUSE Bug 908458", "url": "https://bugzilla.suse.com/908458" }, { "category": "self", "summary": "SUSE Bug 908684", "url": "https://bugzilla.suse.com/908684" }, { "category": "self", "summary": "SUSE Bug 909077", "url": "https://bugzilla.suse.com/909077" }, { "category": "self", "summary": "SUSE Bug 909350", "url": "https://bugzilla.suse.com/909350" }, { "category": "self", "summary": "SUSE Bug 909484", "url": "https://bugzilla.suse.com/909484" }, { "category": "self", "summary": "SUSE Bug 909618", "url": "https://bugzilla.suse.com/909618" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 922947", "url": "https://bugzilla.suse.com/922947" }, { "category": "self", "summary": "SUSE Bug 928138", "url": "https://bugzilla.suse.com/928138" }, { "category": "self", "summary": "SUSE Bug 929141", "url": "https://bugzilla.suse.com/929141" }, { "category": "self", "summary": "SUSE Bug 934760", "url": "https://bugzilla.suse.com/934760" }, { "category": "self", "summary": "SUSE Bug 951392", "url": "https://bugzilla.suse.com/951392" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 968014", "url": "https://bugzilla.suse.com/968014" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 973203", "url": "https://bugzilla.suse.com/973203" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 976867", "url": "https://bugzilla.suse.com/976867" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 979514", "url": "https://bugzilla.suse.com/979514" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 982218", "url": "https://bugzilla.suse.com/982218" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984102", "url": "https://bugzilla.suse.com/984102" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985206", "url": "https://bugzilla.suse.com/985206" }, { "category": "self", "summary": "SUSE Bug 986337", "url": "https://bugzilla.suse.com/986337" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 989764", "url": "https://bugzilla.suse.com/989764" }, { "category": "self", "summary": "SUSE Bug 989779", "url": "https://bugzilla.suse.com/989779" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991923", "url": "https://bugzilla.suse.com/991923" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993127", "url": "https://bugzilla.suse.com/993127" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 994926", "url": "https://bugzilla.suse.com/994926" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996329", "url": "https://bugzilla.suse.com/996329" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998399", "url": "https://bugzilla.suse.com/998399" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-02T11:04:24Z", "generator": { "date": "2016-12-02T11:04:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2976-1", "initial_release_date": "2016-12-02T11:04:24Z", "revision_history": [ { "date": "2016-12-02T11:04:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.i586", "product": { "name": "kernel-default-3.0.101-88.1.i586", "product_id": "kernel-default-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.i586", "product": { "name": "kernel-default-base-3.0.101-88.1.i586", "product_id": "kernel-default-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.i586", "product": { "name": "kernel-default-devel-3.0.101-88.1.i586", "product_id": "kernel-default-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-88.1.i586", "product": { "name": "kernel-ec2-3.0.101-88.1.i586", "product_id": "kernel-ec2-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-88.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-88.1.i586", "product_id": "kernel-ec2-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-88.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-88.1.i586", "product_id": "kernel-ec2-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-88.1.i586", "product": { "name": "kernel-pae-3.0.101-88.1.i586", "product_id": "kernel-pae-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-88.1.i586", "product": { "name": "kernel-pae-base-3.0.101-88.1.i586", "product_id": "kernel-pae-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-88.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-88.1.i586", "product_id": "kernel-pae-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.i586", "product": { "name": "kernel-source-3.0.101-88.1.i586", "product_id": "kernel-source-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.i586", "product": { "name": "kernel-syms-3.0.101-88.1.i586", "product_id": "kernel-syms-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.i586", "product": { "name": "kernel-trace-3.0.101-88.1.i586", "product_id": "kernel-trace-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.i586", "product": { "name": "kernel-trace-base-3.0.101-88.1.i586", "product_id": "kernel-trace-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-88.1.i586", "product_id": "kernel-trace-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-88.1.i586", "product": { "name": "kernel-xen-3.0.101-88.1.i586", "product_id": "kernel-xen-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-88.1.i586", "product": { "name": "kernel-xen-base-3.0.101-88.1.i586", "product_id": "kernel-xen-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-88.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-88.1.i586", "product_id": "kernel-xen-devel-3.0.101-88.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.ia64", "product": { "name": "kernel-default-3.0.101-88.1.ia64", "product_id": "kernel-default-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.ia64", "product": { "name": "kernel-default-base-3.0.101-88.1.ia64", "product_id": "kernel-default-base-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-88.1.ia64", "product_id": "kernel-default-devel-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.ia64", "product": { "name": "kernel-source-3.0.101-88.1.ia64", "product_id": "kernel-source-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.ia64", "product": { "name": "kernel-syms-3.0.101-88.1.ia64", "product_id": "kernel-syms-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.ia64", "product": { "name": "kernel-trace-3.0.101-88.1.ia64", "product_id": "kernel-trace-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-88.1.ia64", "product_id": "kernel-trace-base-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-88.1.ia64", "product_id": "kernel-trace-devel-3.0.101-88.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-88.3.noarch", "product": { "name": "kernel-docs-3.0.101-88.3.noarch", "product_id": "kernel-docs-3.0.101-88.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-88.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-88.1.ppc64", "product_id": "kernel-bigmem-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-88.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-88.1.ppc64", "product": { "name": "kernel-default-3.0.101-88.1.ppc64", "product_id": "kernel-default-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-88.1.ppc64", "product_id": "kernel-default-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-88.1.ppc64", "product_id": "kernel-default-devel-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-88.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-88.1.ppc64", "product_id": "kernel-ppc64-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-88.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.ppc64", "product": { "name": "kernel-source-3.0.101-88.1.ppc64", "product_id": "kernel-source-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.ppc64", "product": { "name": "kernel-syms-3.0.101-88.1.ppc64", "product_id": "kernel-syms-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.ppc64", "product": { "name": "kernel-trace-3.0.101-88.1.ppc64", "product_id": "kernel-trace-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-88.1.ppc64", "product_id": "kernel-trace-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-88.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-88.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.s390x", "product": { "name": "kernel-default-3.0.101-88.1.s390x", "product_id": "kernel-default-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.s390x", "product": { "name": "kernel-default-base-3.0.101-88.1.s390x", "product_id": "kernel-default-base-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-88.1.s390x", "product_id": "kernel-default-devel-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-88.1.s390x", "product": { "name": "kernel-default-man-3.0.101-88.1.s390x", "product_id": "kernel-default-man-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.s390x", "product": { "name": "kernel-source-3.0.101-88.1.s390x", "product_id": "kernel-source-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.s390x", "product": { "name": "kernel-syms-3.0.101-88.1.s390x", "product_id": "kernel-syms-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.s390x", "product": { "name": "kernel-trace-3.0.101-88.1.s390x", "product_id": "kernel-trace-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-88.1.s390x", "product_id": "kernel-trace-base-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-88.1.s390x", "product_id": "kernel-trace-devel-3.0.101-88.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.x86_64", "product": { "name": "kernel-default-3.0.101-88.1.x86_64", "product_id": "kernel-default-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-88.1.x86_64", "product_id": "kernel-default-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-88.1.x86_64", "product_id": "kernel-default-devel-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-88.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-88.1.x86_64", "product_id": "kernel-ec2-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-88.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-88.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.x86_64", "product": { "name": "kernel-source-3.0.101-88.1.x86_64", "product_id": "kernel-source-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.x86_64", "product": { "name": "kernel-syms-3.0.101-88.1.x86_64", "product_id": "kernel-syms-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.x86_64", "product": { "name": "kernel-trace-3.0.101-88.1.x86_64", "product_id": "kernel-trace-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-88.1.x86_64", "product_id": "kernel-trace-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-88.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-88.1.x86_64", "product": { "name": "kernel-xen-3.0.101-88.1.x86_64", "product_id": "kernel-xen-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-88.1.x86_64", "product_id": "kernel-xen-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-88.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-88.3.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" }, "product_reference": "kernel-docs-3.0.101-88.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586" }, "product_reference": "kernel-default-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586" }, "product_reference": "kernel-default-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586" }, "product_reference": "kernel-source-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64" }, "product_reference": "kernel-source-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64" }, "product_reference": "kernel-source-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x" }, "product_reference": "kernel-source-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64" }, "product_reference": "kernel-source-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586" }, "product_reference": "kernel-syms-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64" }, "product_reference": "kernel-syms-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x" }, "product_reference": "kernel-syms-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586" }, "product_reference": "kernel-default-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586" }, "product_reference": "kernel-default-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586" }, "product_reference": "kernel-source-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64" }, "product_reference": "kernel-source-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64" }, "product_reference": "kernel-source-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x" }, "product_reference": "kernel-source-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64" }, "product_reference": "kernel-source-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586" }, "product_reference": "kernel-syms-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64" }, "product_reference": "kernel-syms-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x" }, "product_reference": "kernel-syms-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-7425" } ] }
suse-su-2016:2912-1
Vulnerability from csaf_suse
Published
2016-11-25 12:49
Modified
2016-11-25 12:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in
the Linux kernel used an incorrect buffer size for certain timeout data,
which allowed local users to cause a denial of service (stack memory
corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel
preserved the setgid bit during a setxattr call, which allowed local
users to gain group privileges by leveraging the existence of a setgid
program with restrictions on execute permissions (bsc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in
net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to
obtain sensitive information or cause a denial of service (NULL pointer
dereference) via vectors involving a bind system call on a Bluetooth
RFCOMM socket (bnc#1003925).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly
determine the rate of challenge ACK segments, which made it easier for
man-in-the-middle attackers to hijack TCP sessions via a blind in-window
attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in
drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to
obtain sensitive information from kernel memory by changing a certain
length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux
kernel allowed local users to cause a denial of service (NULL pointer
dereference and system crash) by using an ABORT_TASK command to abort
a device write operation (bnc#994748).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in
drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users
to cause a denial of service (out-of-bounds access or system crash)
by changing a certain size value, aka a 'double fetch' vulnerability
(bnc#991608).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h
in the Linux kernel did not properly maintain certain SACK state after a
failed data copy, which allowed local users to cause a denial of service
(tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted
SACK option (bnc#994296).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in
drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict
a certain length field, which allowed local users to gain privileges
or cause a denial of service (heap-based buffer overflow) via an
ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-8658: Stack-based buffer overflow
in the brcmf_cfg80211_start_ap function in
drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux
kernel allowed local users to cause a denial of service (system crash)
or possibly have unspecified other impact via a long SSID Information
Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers
to cause a denial of service (stack consumption and panic) or possibly
have unspecified other impact by triggering use of the GRO path for
packets with tunnel stacking, as demonstrated by interleaved IPv4 headers
and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up (FATE#315621).
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)).
- arm64: mm: remove broken &= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784).
- be2net: fix BE3-R FW download compatibility check (bsc#921784).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924).
- bonding: Prevent IPv6 link local address on enslaved devices (fate#316924).
- bonding: prevent out of bound accesses (fate#316924).
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: reorder patches to place local patches back at the end of the series
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ceph: After a write, we must free the 'request', not the 'response'. This error crept in during the backport. bsc#995153
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- Document the process to blacklist upstream commit-ids
- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888).
- drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).
- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888).
- drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888).
- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888).
- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).
- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#937888).
- drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888).
- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs.
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- input: Revert 'can: dev: fix deadlock reported after bus-off'.
- input: Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- input: Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU (bsc#961257)
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).
- kabi: clockevents: export clockevents_unbind again.
- kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- kabi: hide harmless change in struct inet_connection_sock (fate#318553).
- kABI: protect backing-dev include in mm/migrate.
- kABI: protect enum usb_device_speed.
- kABI: protect struct mlx5_modify_qp_mbox_in.
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- Kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- memcg: convert threshold to bytes (bnc#931454).
- memcg: fix thresholds for 32b architectures (bnc#931454).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- MSI-X: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oom: print nodemask in the oom report (bnc#1003866).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- rpm/config.sh: Set the SP1 release string to 60.<RELEASE> (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays (fate#316924).
- s390: add SMT support (bnc#994438, LTC#144756).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- sunrpc: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set (fate#318553).
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).
- uprobes: Fix the memcg accounting (bnc#931454).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: Linux 3.12.63.
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1700,SUSE-SLE-Live-Patching-12-2016-1700,SUSE-SLE-Module-Public-Cloud-12-2016-1700,SUSE-SLE-SDK-12-SP1-2016-1700,SUSE-SLE-SERVER-12-SP1-2016-1700,SUSE-SLE-WE-12-SP1-2016-1700
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in\n the Linux kernel used an incorrect buffer size for certain timeout data,\n which allowed local users to cause a denial of service (stack memory\n corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel\n preserved the setgid bit during a setxattr call, which allowed local\n users to gain group privileges by leveraging the existence of a setgid\n program with restrictions on execute permissions (bsc#995968).\n- CVE-2015-8956: The rfcomm_sock_bind function in\n net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to\n obtain sensitive information or cause a denial of service (NULL pointer\n dereference) via vectors involving a bind system call on a Bluetooth\n RFCOMM socket (bnc#1003925).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly\n determine the rate of challenge ACK segments, which made it easier for\n man-in-the-middle attackers to hijack TCP sessions via a blind in-window\n attack (bnc#989152).\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in\n drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to\n obtain sensitive information from kernel memory by changing a certain\n length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542).\n- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux\n kernel allowed local users to cause a denial of service (NULL pointer\n dereference and system crash) by using an ABORT_TASK command to abort\n a device write operation (bnc#994748).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in\n drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users\n to cause a denial of service (out-of-bounds access or system crash)\n by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability\n (bnc#991608).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h\n in the Linux kernel did not properly maintain certain SACK state after a\n failed data copy, which allowed local users to cause a denial of service\n (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted\n SACK option (bnc#994296).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in\n drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict\n a certain length field, which allowed local users to gain privileges\n or cause a denial of service (heap-based buffer overflow) via an\n ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-8658: Stack-based buffer overflow\n in the brcmf_cfg80211_start_ap function in\n drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux\n kernel allowed local users to cause a denial of service (system crash)\n or possibly have unspecified other impact via a long SSID Information\n Element in a command to a Netlink socket (bnc#1004462).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers\n to cause a denial of service (stack consumption and panic) or possibly\n have unspecified other impact by triggering use of the GRO path for\n packets with tunnel stacking, as demonstrated by interleaved IPv4 headers\n and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can\u0027t wake up (FATE#315621).\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don\u0027t check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing (fate#315482)).\n- arm64: mm: remove broken \u0026= operator from pmd_mknotpresent (Automatic NUMA Balancing (fate#315482)).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don\u0027t leak iomapped memory on removal (bsc#921784).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784).\n- be2net: remove vlan promisc capability from VF\u0027s profile descriptors (bsc#921784).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size() (fate#315209).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes (fate#316924).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring (fate#316924).\n- bonding: Prevent IPv6 link local address on enslaved devices (fate#316924).\n- bonding: prevent out of bound accesses (fate#316924).\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader\u0027s use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: reorder patches to place local patches back at the end of the series\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- ceph: After a write, we must free the \u0027request\u0027, not the \u0027response\u0027. This error crept in during the backport. bsc#995153\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- Document the process to blacklist upstream commit-ids\n- drivers/hv: share Hyper-V SynIC constants with userspace (bnc#937888).\n- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#937888).\n- drivers: hv: vmbus: avoid unneeded compiler optimizations in vmbus_wait_for_unload() (bnc#937888).\n- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#937888).\n- drivers: hv: vmbus: Cleanup vmbus_set_event() (bnc#937888).\n- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#937888).\n- drivers: hv: vmbus: do not manipulate with clocksources on crash (bnc#937888).\n- drivers: hv: vmbus: Force all channel messages to be delivered on CPU 0 (bnc#937888).\n- drivers: hv: vmbus: Get rid of the unused irq variable (bnc#937888).\n- drivers: hv: vmbus: handle various crash scenarios (bnc#937888).\n- drivers: hv: vmbus: remove code duplication in message handling (bnc#937888).\n- drivers: hv: vmbus: Support handling messages on multiple CPUs (bnc#937888).\n- drivers: hv: vmbus: Support kexec on ws2012 r2 and above (bnc#937888).\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- ext4: Fixup handling for custom configs.\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- input: Revert \u0027can: dev: fix deadlock reported after bus-off\u0027.\n- input: Revert \u0027Input: i8042 - break load dependency between atkbd/psmouse and i8042\u0027.\n- input: Revert \u0027Input: i8042 - set up shared ps2_cmd_mutex for AUX ports\u0027.\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU (bsc#961257)\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: KABI workaround for ipv6: add complete rcu protection around np-\u003eopt.\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- iwlwifi: dvm: fix flush support for old firmware (bsc#940545).\n- kabi: clockevents: export clockevents_unbind again.\n- kabi: Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- kabi: hide harmless change in struct inet_connection_sock (fate#318553).\n- kABI: protect backing-dev include in mm/migrate.\n- kABI: protect enum usb_device_speed.\n- kABI: protect struct mlx5_modify_qp_mbox_in.\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk/printk.c: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- Kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc-\u003ereq_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- lib/vsprintf: implement bitmap printing through \u0027%*pb[l]\u0027 (bnc#1003866).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- memcg: convert threshold to bytes (bnc#931454).\n- memcg: fix thresholds for 32b architectures (bnc#931454).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975 VM performance -- git fixes).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- MSI-X: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don\u0027t truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oom: print nodemask in the oom report (bnc#1003866).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for \u0027cycles:p\u0027 and \u0027cycles:pp\u0027 on SLM (bsc#997896).\n- pm / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup-\u003ereserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- rpm/config.sh: Set the SP1 release string to 60.\u003cRELEASE\u003e (bsc#997059)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays (fate#316924).\n- s390: add SMT support (bnc#994438, LTC#144756).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- sunrpc: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- sunrpc: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set (fate#318553).\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- Update patches.kabi/kabi.clockevents_unbind.patch (bnc#937888).\n- uprobes: Fix the memcg accounting (bnc#931454).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don\u0027t invoke -\u003eis_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: Linux 3.12.63.\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: Refresh patches.xen/xen3-patch-3.9 (bsc#991247).\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1700,SUSE-SLE-Live-Patching-12-2016-1700,SUSE-SLE-Module-Public-Cloud-12-2016-1700,SUSE-SLE-SDK-12-SP1-2016-1700,SUSE-SLE-SERVER-12-SP1-2016-1700,SUSE-SLE-WE-12-SP1-2016-1700", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2912-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2912-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162912-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2912-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002422.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1000287", "url": "https://bugzilla.suse.com/1000287" }, { "category": "self", "summary": "SUSE Bug 1000304", "url": "https://bugzilla.suse.com/1000304" }, { "category": "self", "summary": "SUSE Bug 1000776", "url": "https://bugzilla.suse.com/1000776" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1001486", "url": "https://bugzilla.suse.com/1001486" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003079", "url": "https://bugzilla.suse.com/1003079" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003400", "url": "https://bugzilla.suse.com/1003400" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003866", "url": "https://bugzilla.suse.com/1003866" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1003964", "url": "https://bugzilla.suse.com/1003964" }, { "category": "self", "summary": "SUSE Bug 1004252", "url": "https://bugzilla.suse.com/1004252" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1006691", "url": "https://bugzilla.suse.com/1006691" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1007886", "url": "https://bugzilla.suse.com/1007886" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 772786", "url": "https://bugzilla.suse.com/772786" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 857397", "url": "https://bugzilla.suse.com/857397" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 865545", "url": "https://bugzilla.suse.com/865545" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 868923", "url": "https://bugzilla.suse.com/868923" }, { "category": "self", "summary": "SUSE Bug 874131", "url": "https://bugzilla.suse.com/874131" }, { "category": "self", "summary": "SUSE Bug 876463", "url": "https://bugzilla.suse.com/876463" }, { "category": "self", "summary": "SUSE Bug 898675", "url": "https://bugzilla.suse.com/898675" }, { "category": "self", "summary": "SUSE Bug 904489", "url": "https://bugzilla.suse.com/904489" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921784", "url": "https://bugzilla.suse.com/921784" }, { "category": "self", "summary": "SUSE Bug 922064", "url": "https://bugzilla.suse.com/922064" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 924384", "url": "https://bugzilla.suse.com/924384" }, { "category": "self", "summary": "SUSE Bug 930399", "url": "https://bugzilla.suse.com/930399" }, { "category": "self", "summary": "SUSE Bug 931454", "url": "https://bugzilla.suse.com/931454" }, { "category": "self", "summary": "SUSE Bug 934067", "url": "https://bugzilla.suse.com/934067" }, { "category": "self", "summary": "SUSE Bug 937086", "url": "https://bugzilla.suse.com/937086" }, { "category": "self", "summary": "SUSE Bug 937888", "url": "https://bugzilla.suse.com/937888" }, { "category": "self", "summary": "SUSE Bug 940545", "url": "https://bugzilla.suse.com/940545" }, { "category": "self", "summary": "SUSE Bug 941420", "url": "https://bugzilla.suse.com/941420" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 955446", "url": "https://bugzilla.suse.com/955446" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 959463", "url": "https://bugzilla.suse.com/959463" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 966864", "url": "https://bugzilla.suse.com/966864" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 970943", "url": "https://bugzilla.suse.com/970943" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974406", "url": "https://bugzilla.suse.com/974406" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 975596", "url": "https://bugzilla.suse.com/975596" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 979451", "url": "https://bugzilla.suse.com/979451" }, { "category": "self", "summary": "SUSE Bug 979928", "url": "https://bugzilla.suse.com/979928" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984779", "url": "https://bugzilla.suse.com/984779" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985562", "url": "https://bugzilla.suse.com/985562" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987621", "url": "https://bugzilla.suse.com/987621" }, { "category": "self", "summary": "SUSE Bug 987805", "url": "https://bugzilla.suse.com/987805" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 988617", "url": "https://bugzilla.suse.com/988617" }, { "category": "self", "summary": "SUSE Bug 988715", "url": "https://bugzilla.suse.com/988715" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989953", "url": "https://bugzilla.suse.com/989953" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 991247", "url": "https://bugzilla.suse.com/991247" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 992244", "url": "https://bugzilla.suse.com/992244" }, { "category": "self", "summary": "SUSE Bug 992555", "url": "https://bugzilla.suse.com/992555" }, { "category": "self", "summary": "SUSE Bug 992591", "url": "https://bugzilla.suse.com/992591" }, { "category": "self", "summary": "SUSE Bug 992593", "url": "https://bugzilla.suse.com/992593" }, { "category": "self", "summary": "SUSE Bug 992712", "url": "https://bugzilla.suse.com/992712" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993841", "url": "https://bugzilla.suse.com/993841" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994438", "url": "https://bugzilla.suse.com/994438" }, { "category": "self", "summary": "SUSE Bug 994520", "url": "https://bugzilla.suse.com/994520" }, { "category": "self", "summary": "SUSE Bug 994748", "url": "https://bugzilla.suse.com/994748" }, { "category": "self", "summary": "SUSE Bug 995153", "url": "https://bugzilla.suse.com/995153" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 997299", "url": "https://bugzilla.suse.com/997299" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 997896", "url": "https://bugzilla.suse.com/997896" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 998825", "url": "https://bugzilla.suse.com/998825" }, { "category": "self", "summary": "SUSE Bug 999577", "url": "https://bugzilla.suse.com/999577" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999779", "url": "https://bugzilla.suse.com/999779" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-11-25T12:49:49Z", "generator": { "date": "2016-11-25T12:49:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2912-1", "initial_release_date": "2016-11-25T12:49:49Z", "revision_history": [ { "date": "2016-11-25T12:49:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.67-60.64.18.1.noarch", "product": { "name": "kernel-devel-3.12.67-60.64.18.1.noarch", "product_id": "kernel-devel-3.12.67-60.64.18.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.67-60.64.18.1.noarch", "product": { "name": "kernel-macros-3.12.67-60.64.18.1.noarch", "product_id": "kernel-macros-3.12.67-60.64.18.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.67-60.64.18.1.noarch", "product": { "name": "kernel-source-3.12.67-60.64.18.1.noarch", "product_id": "kernel-source-3.12.67-60.64.18.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.67-60.64.18.3.noarch", "product": { "name": "kernel-docs-3.12.67-60.64.18.3.noarch", "product_id": "kernel-docs-3.12.67-60.64.18.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "product_id": "kernel-obs-build-3.12.67-60.64.18.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.67-60.64.18.1.ppc64le", "product": { "name": "kernel-default-3.12.67-60.64.18.1.ppc64le", "product_id": "kernel-default-3.12.67-60.64.18.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.67-60.64.18.1.ppc64le", "product": { "name": "kernel-default-base-3.12.67-60.64.18.1.ppc64le", "product_id": "kernel-default-base-3.12.67-60.64.18.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "product_id": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.67-60.64.18.1.ppc64le", "product": { "name": "kernel-syms-3.12.67-60.64.18.1.ppc64le", "product_id": "kernel-syms-3.12.67-60.64.18.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.67-60.64.18.1.s390x", "product": { "name": "kernel-obs-build-3.12.67-60.64.18.1.s390x", "product_id": "kernel-obs-build-3.12.67-60.64.18.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.67-60.64.18.1.s390x", "product": { "name": "kernel-default-3.12.67-60.64.18.1.s390x", "product_id": "kernel-default-3.12.67-60.64.18.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.67-60.64.18.1.s390x", "product": { "name": "kernel-default-base-3.12.67-60.64.18.1.s390x", "product_id": "kernel-default-base-3.12.67-60.64.18.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.67-60.64.18.1.s390x", "product": { "name": "kernel-default-devel-3.12.67-60.64.18.1.s390x", "product_id": "kernel-default-devel-3.12.67-60.64.18.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.67-60.64.18.1.s390x", "product": { "name": "kernel-default-man-3.12.67-60.64.18.1.s390x", "product_id": "kernel-default-man-3.12.67-60.64.18.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.67-60.64.18.1.s390x", "product": { "name": "kernel-syms-3.12.67-60.64.18.1.s390x", "product_id": "kernel-syms-3.12.67-60.64.18.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-default-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-default-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-default-devel-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-default-devel-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-default-extra-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-default-extra-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-syms-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-syms-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-xen-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-xen-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "product": { "name": "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "product_id": "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-ec2-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-ec2-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-obs-build-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-obs-build-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-default-base-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-default-base-3.12.67-60.64.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.67-60.64.18.1.x86_64", "product": { "name": "kernel-xen-base-3.12.67-60.64.18.1.x86_64", "product_id": "kernel-xen-base-3.12.67-60.64.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-devel-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-macros-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-source-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64" }, "product_reference": "kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-ec2-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.67-60.64.18.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch" }, "product_reference": "kernel-docs-3.12.67-60.64.18.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-obs-build-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-base-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-base-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-man-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-devel-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-macros-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-source-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-base-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-base-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-default-man-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-devel-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-macros-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.67-60.64.18.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch" }, "product_reference": "kernel-source-3.12.67-60.64.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-syms-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.67-60.64.18.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.67-60.64.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "low" } ], "title": "CVE-2016-8658" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-default-1-6.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_67-60_64_18-xen-1-6.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.67-60.64.18.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.67-60.64.18.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.67-60.64.18.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.67-60.64.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-11-25T12:49:49Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2245-1
Vulnerability from csaf_suse
Published
2016-09-06 09:28
Modified
2016-09-06 09:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)
The following non-security bugs were fixed:
- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
- Update PCI VPD size patch to upstream:
* PCI: Determine actual VPD size on first access (bsc#971729).
* PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
- hid-elo: kill not flush the work.
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- nfs: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- nfs: reduce access cache shrinker locking (bnc#866130).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
- usbhid: more mice with ALWAYS_POLL (bsc#919351).
- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
- veth: do not modify ip_summed (bsc#969149).
- virtio_scsi: Implement eh_timed_out callback.
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).
Patchnames
sleclo50sp3-kernel-12730,sleman21-kernel-12730,slemap21-kernel-12730,sleposp3-kernel-12730,slessp3-kernel-12730,slexsp3-kernel-12730
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability. (bsc#991608)\n\nThe following non-security bugs were fixed:\n- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).\n- Update PCI VPD size patch to upstream: \n * PCI: Determine actual VPD size on first access (bsc#971729). \n * PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)\n- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).\n- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).\n- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).\n- hid-elo: kill not flush the work.\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- ipv4: fix ineffective source address selection (bsc#980788).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).\n- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- nfs: Do not attempt to decode missing directory entries (bsc#980931).\n- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).\n- nfs: reduce access cache shrinker locking (bnc#866130).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).\n- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).\n- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).\n- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).\n- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).\n- usbhid: more mice with ALWAYS_POLL (bsc#919351).\n- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).\n- veth: do not modify ip_summed (bsc#969149).\n- virtio_scsi: Implement eh_timed_out callback.\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).\n- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-kernel-12730,sleman21-kernel-12730,slemap21-kernel-12730,sleposp3-kernel-12730,slessp3-kernel-12730,slexsp3-kernel-12730", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2245-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2245-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162245-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2245-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 919351", "url": "https://bugzilla.suse.com/919351" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 962404", "url": "https://bugzilla.suse.com/962404" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 966460", "url": "https://bugzilla.suse.com/966460" }, { "category": "self", "summary": "SUSE Bug 969149", "url": "https://bugzilla.suse.com/969149" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971446", "url": "https://bugzilla.suse.com/971446" }, { "category": "self", "summary": "SUSE Bug 971729", "url": "https://bugzilla.suse.com/971729" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 974428", "url": "https://bugzilla.suse.com/974428" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 980788", "url": "https://bugzilla.suse.com/980788" }, { "category": "self", "summary": "SUSE Bug 980931", "url": "https://bugzilla.suse.com/980931" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 984107", "url": "https://bugzilla.suse.com/984107" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 987709", "url": "https://bugzilla.suse.com/987709" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989401", "url": "https://bugzilla.suse.com/989401" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3955 page", "url": "https://www.suse.com/security/cve/CVE-2016-3955/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-09-06T09:28:39Z", "generator": { "date": "2016-09-06T09:28:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2245-1", "initial_release_date": "2016-09-06T09:28:39Z", "revision_history": [ { "date": "2016-09-06T09:28:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.86.1.i586", "product_id": "kernel-source-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.i586", "product_id": "kernel-syms-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.86.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.86.1.s390x", "product_id": "kernel-source-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3955" } ], "notes": [ { "category": "general", "text": "The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3955", "url": "https://www.suse.com/security/cve/CVE-2016-3955" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3955", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 975945 for CVE-2016-3955", "url": "https://bugzilla.suse.com/975945" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-3955", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-3955" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2017:1102-1
Vulnerability from csaf_suse
Published
2017-04-25 14:34
Modified
2017-04-25 14:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during
a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the
existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of
an incomplete fix for CVE-2016-7097 (bnc#1021258).
- CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations
where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or
cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and
drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and
cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet,
especially in protocols that use long-lived connections, such as BGP (bnc#989152).
- CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship
between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause
a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local
malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate
because it first requires compromising a privileged process and current compiler optimizations restrict access to the
vulnerable code. (bnc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of
sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system
call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux
kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed
local users to cause a denial of service (memory corruption and system crash)
or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN
capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2)
SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly
initialize Code Segment (CS) in certain error cases, which allowed local users
to obtain sensitive information from kernel stack memory via a crafted
application (bnc#1013038).
- CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (bsc#1013604)
- CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533)
- CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around np->opt (bsc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c
in the Linux kernel allowed local users to cause a denial of service (memory
consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in
drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or
cause a denial of service (memory corruption and system crash) by detaching a
device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the
Linux kernel lacks chunk-length checking for the first chunk, which allowed
remote attackers to cause a denial of service (out-of-bounds slab access) or
possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in
block/genhd.c in the Linux kernel allowed local users to gain privileges by
leveraging the execution of a certain stop operation even if the corresponding
start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in
block/ioprio.c in the Linux kernel allowed local users to gain privileges or
cause a denial of service (use-after-free) via a crafted ioprio_get system call
(bnc#1010711).
- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to
gain privileges or cause a denial of service (system crash) via a VAPIC
synchronization operation involving a page-end address (bnc#853052).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c
in the Linux kernel allowed local users to obtain sensitive information from
kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Revert 'proc: prevent accessing /proc/<PID>/environ until it's ready (bsc#1010467)'
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux
kernel allowed local users to cause a denial of service (OOPS) by attempting to
trigger use of in-kernel hash algorithms for a socket that has received zero
bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in
certain unusual hardware configurations, allowed remote attackers to execute
arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517).
- CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925).
- CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077).
The following non-security bugs were fixed:
- blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk
- blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags
- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).
- IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036).
- IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036).
- IB/mlx4: Fix memory leak if QP creation failed (bsc#786036).
- IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036).
- IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036).
- IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036).
- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- be2net: Do not leak iomapped memory on removal (bug#925065).
- block_dev: do not test bdev->bd_contains when it is not stable (bsc#1008557).
- bna: Add synchronization for tx ring (bsc#993739).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnx2x: fix lockdep splat (bsc#908684).
- cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655)
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cpumask_set_cpu_local_first => cpumask_local_spread, lament (bug#919382).
- crypto: add ghash-generic in the supported.conf(bsc#1016824)
- crypto: aesni - Add support for 192 & 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks()
- dm thin: fix race condition when destroying thin pool workqueue
- dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893).
- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)
- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).
- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).
- ext4: fix reference counting bug on block allocation error (bsc#1013018).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- futex: Acknowledge a new waiter in counter before plist (bsc#851603).
- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).
- hpilo: Add support for iLO5 (bsc#999101).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- hv: vmbus: handle various crash scenarios (bnc#986337).
- hv: vmbus: remove code duplication in message handling (bnc#986337).
- hv: vss: run only on supported host versions (bnc#986337).
- i40e: fix an uninitialized variable bug (bsc#909484).
- ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148).
- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491).
- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297).
- igb: Fix oops caused by missing queue pairing (bsc#909491).
- igb: Fix oops on changing number of rings (bsc#909491).
- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491).
- igb: Unpair the queues when changing the number of queues (bsc#909491).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi-fix for flock_owner addition (bsc#998689).
- kexec: add a kexec_crash_loaded() function (bsc#973691).
- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).
- kvm: Distangle eventfd code from irqchip (bsc#989680).
- kvm: Iterate over only vcpus that are preempted (bsc#989680).
- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).
- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).
- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).
- kvm: make processes waiting on vcpu mutex killable (bsc#989680).
- kvm: nVMX: Add preemption timer support (bsc#989680).
- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).
- kvm: use symbolic constant for nr interrupts (bsc#989680).
- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).
- kvm: x86: Run PIT work in own kthread (bsc#989680).
- kvm: x86: limit difference between kvmclock updates (bsc#989680).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- libata: introduce ata_host->n_tags to avoid oops on SAS controllers (bsc#871728).
- libata: remove n_tags to avoid kABI breakage (bsc#871728).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: Update rport reference counting (bsc#953233).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).
- md/raid10: Fix memory leak when raid10 reshape completes
- md/raid10: always set reshape_safe when initializing reshape_position
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- memstick: mspro_block: add missing curly braces (bsc#1016688).
- mlx4: add missing braces in verify_qp_parameters (bsc#786036).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).
- mm: fix crashes from mbind() merging vmas (bnc#1005877).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036).
- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382).
- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036).
- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).
- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036).
- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382).
- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036).
- net/mlx4_core: Implement pci_resume callback (bsc#924708).
- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382).
- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382).
- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382).
- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036).
- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036).
- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382).
- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netfront: do not truncate grant references.
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).
- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).
- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nvme: Automatic namespace rescan (bsc#1017686).
- nvme: Metadata format support (bsc#1017686).
- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).
- oom: print nodemask in the oom report (bnc#1003866).
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).
- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC'
obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: fix typo 'CONFIG_PPC_CPU' (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).
- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).
- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).
- qlcnic: fix a loop exit condition better (bsc#909350).
- qlcnic: fix a timeout loop (bsc#909350)
- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999).
- reiserfs: fix race in prealloc discard (bsc#987576).
- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- rpm/package-descriptions: add -bigmem description
- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).
- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- scsi_error: count medium access timeout only once per EH run (bsc#993832).
- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)
- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618).
- softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend
cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than
the priority specified by the user.
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).
- sunrpc: Fix reconnection timeouts (bsc#1014410).
- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).
- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).
- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).
- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).
- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).
- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458).
- tg3: Fix temperature reporting (bnc#790588).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- usb: console: fix potential use after free (bsc#1015817).
- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).
- usb: cp210x: Corrected USB request type definitions (bsc#1015932).
- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).
- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).
- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: ipaq.c: fix a timeout loop (bsc#1015848).
- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).
- usb: option: fix runtime PM handling (bsc#1015752).
- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).
- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).
- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).
- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).
- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).
- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).
- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).
- usb: sierra: fix AA deadlock in open error path (bsc#1015561).
- usb: sierra: fix remote wakeup (bsc#1015561).
- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).
- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).
- usb: sierra: fix use after free at suspend/resume (bsc#1015561).
- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).
- usb: usb_wwan: fix race between write and resume (bsc#1015760).
- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).
- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).
- usb: usb_wwan: fix write and suspend race (bsc#1015760).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors
- x86/gart: Check for GART support before accessing GART registers
- xenbus: do not invoke ->is_ready() for most device states (bsc#987333).
- zcrypt: Fix hang condition on crypto card config-off (bsc#1016320).
- zcrypt: Fix invalid domain response handling (bsc#1016320).
- zfcp: Fix erratic device offline during EH (bsc#993832).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677).
- zfcp: fix ELS/GS request&response length for hardware data router (bnc#1003677).
- zfcp: fix payload trace length for SAN request&response (bnc#1003677).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677).
- zfcp: trace on request for open and close of WKA port (bnc#1003677).
Patchnames
slertesp4-kernel-13074
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SLE-11 SP4 kernel was updated to 3.0.101.rt130-68 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserved the setgid bit during\n a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the\n existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of\n an incomplete fix for CVE-2016-7097 (bnc#1021258).\n- CVE-2016-7097: posix_acl: Clear SGID bit when setting file permissions (bsc#995968).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations\n where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or\n cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and \n drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-5696: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and\n cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet,\n especially in protocols that use long-lived connections, such as BGP (bnc#989152).\n- CVE-2015-1350: Denial of service in notify_change for filesystem xattrs (bsc#914939).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship\n between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause\n a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could have enabled a local\n malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate\n because it first requires compromising a privileged process and current compiler optimizations restrict access to the\n vulnerable code. (bnc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of \n sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system\n call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux\n kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed\n local users to cause a denial of service (memory corruption and system crash)\n or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN\n capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2)\n SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly\n initialize Code Segment (CS) in certain error cases, which allowed local users\n to obtain sensitive information from kernel stack memory via a crafted\n application (bnc#1013038).\n- CVE-2016-9576: splice: introduce FMODE_SPLICE_READ and FMODE_SPLICE_WRITE (bsc#1013604)\n- CVE-2016-9794: ALSA: pcm : Call kill_fasync() in stream lock (bsc#1013533)\n- CVE-2016-3841: KABI workaround for ipv6: add complete rcu protection around np-\u003eopt (bsc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c\n in the Linux kernel allowed local users to cause a denial of service (memory\n consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in\n drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or\n cause a denial of service (memory corruption and system crash) by detaching a\n device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the\n Linux kernel lacks chunk-length checking for the first chunk, which allowed\n remote attackers to cause a denial of service (out-of-bounds slab access) or\n possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n - CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in\n block/genhd.c in the Linux kernel allowed local users to gain privileges by\n leveraging the execution of a certain stop operation even if the corresponding\n start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in\n block/ioprio.c in the Linux kernel allowed local users to gain privileges or\n cause a denial of service (use-after-free) via a crafted ioprio_get system call\n (bnc#1010711).\n- CVE-2013-6368: The KVM subsystem in the Linux kernel allowed local users to\n gain privileges or cause a denial of service (system crash) via a VAPIC\n synchronization operation involving a page-end address (bnc#853052).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c\n in the Linux kernel allowed local users to obtain sensitive information from\n kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Revert \u0027proc: prevent accessing /proc/\u003cPID\u003e/environ until it\u0027s ready (bsc#1010467)\u0027\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux\n kernel allowed local users to cause a denial of service (OOPS) by attempting to\n trigger use of in-kernel hash algorithms for a socket that has received zero\n bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in\n certain unusual hardware configurations, allowed remote attackers to execute\n arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: KEYS: Fix short sprintf buffer in /proc/keys show function (bsc#1004517).\n- CVE-2015-8956: Bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925).\n- CVE-2016-7117: net: Fix use after free in the recvmmsg exit path (bsc#1003077).\n\nThe following non-security bugs were fixed:\n\n- blacklist.conf: 45f13df be2net: Enable Wake-On-LAN from shutdown for Skyhawk\n- blacklist.conf: c9cc599 net/mlx4_core: Fix QUERY FUNC CAP flags\n\n- 8250_pci: Fix potential use-after-free in error path (bsc#1013070).\n- IB/mlx4: Fix error flow when sending mads under SRIOV (bsc#786036).\n- IB/mlx4: Fix incorrect MC join state bit-masking on SR-IOV (bsc#786036).\n- IB/mlx4: Fix memory leak if QP creation failed (bsc#786036).\n- IB/mlx4: Fix potential deadlock when sending mad to wire (bsc#786036).\n- IB/mlx4: Forbid using sysfs to change RoCE pkeys (bsc#786036).\n- IB/mlx4: Use correct subnet-prefix in QP1 mads under SR-IOV (bsc#786036).\n- apparmor: fix IRQ stack overflow during free_profile (bsc#1009875).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- be2net: Do not leak iomapped memory on removal (bug#925065).\n- block_dev: do not test bdev-\u003ebd_contains when it is not stable (bsc#1008557).\n- bna: Add synchronization for tx ring (bsc#993739).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnx2x: fix lockdep splat (bsc#908684).\n- cifs: revert fs/cifs: fix wrongly prefixed path to root (bsc#963655)\n- config.conf: add bigmem flavour on ppc64\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cpumask_set_cpu_local_first =\u003e cpumask_local_spread, lament (bug#919382).\n- crypto: add ghash-generic in the supported.conf(bsc#1016824)\n- crypto: aesni - Add support for 192 \u0026 256 bit keys to AESNI RFC4106 (bsc#913387, #bsc1016831).\n- dm space map metadata: fix sm_bootstrap_get_nr_blocks()\n- dm thin: fix race condition when destroying thin pool workqueue\n- dm: do not call dm_sync_table() when creating new devices (bnc#901809, bsc#1008893).\n- drm/mgag200: Added support for the new deviceID for G200eW3 (bnc#1019348)\n- ext3: Avoid premature failure of ext3_has_free_blocks() (bsc#1016668).\n- ext4: do not leave i_crtime.tv_sec uninitialized (bsc#1013018).\n- ext4: fix reference counting bug on block allocation error (bsc#1013018).\n- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).\n- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).\n- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).\n- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).\n- fs/cifs: cifs_get_root shouldn\u0027t use path with tree name (bsc#963655, bsc#979681).\n- fs/cifs: make share unaccessible at root level mountable (bsc#799133).\n- futex: Acknowledge a new waiter in counter before plist (bsc#851603).\n- futex: Drop refcount if requeue_pi() acquired the rtmutex (bsc#851603).\n- hpilo: Add support for iLO5 (bsc#999101).\n- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).\n- hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).\n- hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).\n- hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).\n- hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).\n- hv: vmbus: handle various crash scenarios (bnc#986337).\n- hv: vmbus: remove code duplication in message handling (bnc#986337).\n- hv: vss: run only on supported host versions (bnc#986337).\n- i40e: fix an uninitialized variable bug (bsc#909484).\n- ibmveth: calculate gso_segs for large packets (bsc#1019165, bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019165, bsc#1019148).\n- igb: Enable SR-IOV configuration via PCI sysfs interface (bsc#909491).\n- igb: Fix NULL assignment to incorrect variable in igb_reset_q_vector (bsc#795297).\n- igb: Fix oops caused by missing queue pairing (bsc#909491).\n- igb: Fix oops on changing number of rings (bsc#909491).\n- igb: Remove unnecessary flag setting in igb_set_flag_queue_pairs() (bsc#909491).\n- igb: Unpair the queues when changing the number of queues (bsc#909491).\n- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).\n- kabi-fix for flock_owner addition (bsc#998689).\n- kexec: add a kexec_crash_loaded() function (bsc#973691).\n- kvm: APIC: avoid instruction emulation for EOI writes (bsc#989680).\n- kvm: Distangle eventfd code from irqchip (bsc#989680).\n- kvm: Iterate over only vcpus that are preempted (bsc#989680).\n- kvm: Record the preemption status of vcpus using preempt notifiers (bsc#989680).\n- kvm: VMX: Pass vcpu to __vmx_complete_interrupts (bsc#989680).\n- kvm: fold kvm_pit_timer into kvm_kpit_state (bsc#989680).\n- kvm: make processes waiting on vcpu mutex killable (bsc#989680).\n- kvm: nVMX: Add preemption timer support (bsc#989680).\n- kvm: remove a wrong hack of delivery PIT intr to vcpu0 (bsc#989680).\n- kvm: use symbolic constant for nr interrupts (bsc#989680).\n- kvm: x86: Remove support for reporting coalesced APIC IRQs (bsc#989680).\n- kvm: x86: Run PIT work in own kthread (bsc#989680).\n- kvm: x86: limit difference between kvmclock updates (bsc#989680).\n- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).\n- lib/vsprintf: implement bitmap printing through \u0027%*pb[l]\u0027 (bnc#1003866).\n- libata: introduce ata_host-\u003en_tags to avoid oops on SAS controllers (bsc#871728).\n- libata: remove n_tags to avoid kABI breakage (bsc#871728).\n- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: Update rport reference counting (bsc#953233).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- locking/mutex: Explicitly mark task as running after wakeup (bsc#1012411).\n- md/raid10: Fix memory leak when raid10 reshape completes\n- md/raid10: always set reshape_safe when initializing reshape_position\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: fix problem when adding device to read-only array with bitmap (bnc#771065).\n- memstick: mspro_block: add missing curly braces (bsc#1016688).\n- mlx4: add missing braces in verify_qp_parameters (bsc#786036).\n- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).\n- mm/memory.c: actually remap enough memory (bnc#1005903).\n- mm/memory_hotplug.c: check for missing sections in test_pages_in_a_zone() (bnc#961589).\n- mm: fix crashes from mbind() merging vmas (bnc#1005877).\n- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).\n- dcache: move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (bsc#1008645).\n- mshyperv: fix recognition of Hyper-V guest crash MSR\u0027s (bnc#986337).\n- net/mlx4: Copy/set only sizeof struct mlx4_eqe bytes (bsc#786036).\n- net/mlx4_core: Allow resetting VF admin mac to zero (bsc#919382).\n- net/mlx4_core: Avoid returning success in case of an error flow (bsc#786036).\n- net/mlx4_core: Do not BUG_ON during reset when PCI is offline (bsc#924708).\n- net/mlx4_core: Do not access comm channel if it has not yet been initialized (bsc#924708 bsc#786036).\n- net/mlx4_core: Fix error message deprecation for ConnectX-2 cards (bug#919382).\n- net/mlx4_core: Fix the resource-type enum in res tracker to conform to FW spec (bsc#786036).\n- net/mlx4_core: Implement pci_resume callback (bsc#924708).\n- net/mlx4_core: Update the HCA core clock frequency after INIT_PORT (bug#919382).\n- net/mlx4_en: Choose time-stamping shift value according to HW frequency (bsc#919382).\n- net/mlx4_en: Fix HW timestamp init issue upon system startup (bsc#919382).\n- net/mlx4_en: Fix potential deadlock in port statistics flow (bsc#786036).\n- net/mlx4_en: Move filters cleanup to a proper location (bsc#786036).\n- net/mlx4_en: Remove dependency between timestamping capability and service_task (bsc#919382).\n- net/mlx4_en: fix spurious timestamping callbacks (bsc#919382).\n- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).\n- netfront: do not truncate grant references.\n- netvsc: fix incorrect receive checksum offloading (bnc#1006917).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).\n- nfsv4: Cap the transport reconnection timer at 1/2 lease period (bsc#1014410).\n- nfsv4: Cleanup the setting of the nfs4 lease period (bsc#1014410).\n- nfsv4: Handle timeouts correctly when probing for lease validity (bsc#1014410).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nvme: Automatic namespace rescan (bsc#1017686).\n- nvme: Metadata format support (bsc#1017686).\n- ocfs2: fix BUG_ON() in ocfs2_ci_checkpointed() (bnc#1019783).\n- oom: print nodemask in the oom report (bnc#1003866).\n- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- posix-timers: Remove remaining uses of tasklist_lock (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock for task clock sample (bnc#997401).\n- posix-timers: Use sighand lock instead of tasklist_lock on timer deletion (bnc#997401).\n- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).\n- powerpc/MSI: Fix race condition in tearing down MSI interrupts (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/mm/hash64: Fix subpage protection with 4K HPTE config (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).\n- powerpc/mm: Change the swap encoding in pte (bsc#973203).\n- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).\n- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).\n- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).\n- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).\n- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).\n- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).\n- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).\n- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).\n- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).\n- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).\n- powerpc/numa: Fix multiple bugs in memory_hotplug_max() (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc/pseries: Use H_CLEAR_HPT to clear MMU hash table during kexec (bsc#1003813).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: Update kernel VSID range (bsc#928138,fate#319026).\n- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo \u0027CONFIG_PMAC\u0027\n obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: fix typo \u0027CONFIG_PPC_CPU\u0027 (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- powerpc: scan_features() updates incorrect bits for REAL_LE (bsc#1010201, [2016-10-04] Pending Base Kernel Fixes).\n- printk/sched: Introduce special printk_sched() for those awkward (bsc#1013042, bsc#996541, bsc#1015878).\n- ptrace: __ptrace_may_access() should not deny sub-threads (bsc#1012851).\n- qlcnic: fix a loop exit condition better (bsc#909350).\n- qlcnic: fix a timeout loop (bsc#909350)\n- qlcnic: use the correct ring in qlcnic_83xx_process_rcv_ring_diag() (bnc#800999).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- rpm/constraints.in: Bump ppc64 disk requirements to fix OBS builds again\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- rpm/package-descriptions: add -bigmem description\n- rt2x00: fix rfkill regression on rt2500pci (bnc#748806).\n- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).\n- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).\n- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).\n- scsi: lpfc: Set elsiocb contexts to NULL after freeing it (bsc#996557).\n- scsi: lpfc: avoid double free of resource identifiers (bsc#989896).\n- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832).\n- scsi_error: fixup crash in scsi_eh_reset (bsc#993832)\n- serial: 8250_pci: Detach low-level driver during PCI error recovery (bsc#1013070).\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618).\n- softirq: sirq threads raising another sirq delegate to the proper thread Otherwise, high priority timer threads expend\n cycles precessing other sirqs, potentially increasing wakeup latencies as thes process sirqs at a priority other than\n the priority specified by the user.\n- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).\n- sunrpc: Enforce an upper limit on the number of cached credentials (bsc#1012917).\n- sunrpc: Fix reconnection timeouts (bsc#1014410).\n- sunrpc: Fix two issues with drop_caches and the sunrpc auth cache (bsc#1012917).\n- sunrpc: Limit the reconnect backoff timer to the max RPC message timeout (bsc#1014410).\n- tcp: fix inet6_csk_route_req() for link-local addresses (bsc#1010175).\n- tcp: pass fl6 to inet6_csk_route_req() (bsc#1010175).\n- tcp: plug dst leak in tcp_v6_conn_request() (bsc#1010175).\n- tcp: use inet6_csk_route_req() in tcp_v6_send_synack() (bsc#1010175).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458).\n- tg3: Fix temperature reporting (bnc#790588).\n- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).\n- usb: console: fix potential use after free (bsc#1015817).\n- usb: console: fix uninitialised ldisc semaphore (bsc#1015817).\n- usb: cp210x: Corrected USB request type definitions (bsc#1015932).\n- usb: cp210x: relocate private data from USB interface to port (bsc#1015932).\n- usb: cp210x: work around cp2108 GET_LINE_CTL bug (bsc#1015932).\n- usb: ftdi_sio: fix null deref at port probe (bsc#1015796).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).\n- usb: ipaq.c: fix a timeout loop (bsc#1015848).\n- usb: opticon: fix non-atomic allocation in write path (bsc#1015803).\n- usb: option: fix runtime PM handling (bsc#1015752).\n- usb: serial: cp210x: add 16-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add 8-bit and 32-bit register access functions (bsc#1015932).\n- usb: serial: cp210x: add new access functions for large registers (bsc#1015932).\n- usb: serial: cp210x: fix hardware flow-control disable (bsc#1015932).\n- usb: serial: fix potential use-after-free after failed probe (bsc#1015828).\n- usb: serial: io_edgeport: fix memory leaks in attach error path (bsc#1016505).\n- usb: serial: io_edgeport: fix memory leaks in probe error path (bsc#1016505).\n- usb: serial: keyspan: fix use-after-free in probe error path (bsc#1016520).\n- usb: sierra: fix AA deadlock in open error path (bsc#1015561).\n- usb: sierra: fix remote wakeup (bsc#1015561).\n- usb: sierra: fix urb and memory leak in resume error path (bsc#1015561).\n- usb: sierra: fix urb and memory leak on disconnect (bsc#1015561).\n- usb: sierra: fix use after free at suspend/resume (bsc#1015561).\n- usb: usb_wwan: fix potential blocked I/O after resume (bsc#1015760).\n- usb: usb_wwan: fix race between write and resume (bsc#1015760).\n- usb: usb_wwan: fix urb leak at shutdown (bsc#1015760).\n- usb: usb_wwan: fix urb leak in write error path (bsc#1015760).\n- usb: usb_wwan: fix write and suspend race (bsc#1015760).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usblp: do not set TASK_INTERRUPTIBLE before lock (bsc#1015844).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86, amd_nb: Clarify F15h, model 30h GART and L3 support\n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors\n- x86/gart: Check for GART support before accessing GART registers\n- xenbus: do not invoke -\u003eis_ready() for most device states (bsc#987333).\n- zcrypt: Fix hang condition on crypto card config-off (bsc#1016320).\n- zcrypt: Fix invalid domain response handling (bsc#1016320).\n- zfcp: Fix erratic device offline during EH (bsc#993832).\n- zfcp: close window with unblocked rport during rport gone (bnc#1003677).\n- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677).\n- zfcp: fix ELS/GS request\u0026response length for hardware data router (bnc#1003677).\n- zfcp: fix payload trace length for SAN request\u0026response (bnc#1003677).\n- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677).\n- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677).\n- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677).\n- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677).\n- zfcp: trace on request for open and close of WKA port (bnc#1003677).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-13074", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1102-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1102-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171102-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1102-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-April/002828.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003344", "url": "https://bugzilla.suse.com/1003344" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003677", "url": "https://bugzilla.suse.com/1003677" }, { "category": "self", "summary": "SUSE Bug 1003813", "url": "https://bugzilla.suse.com/1003813" }, { "category": "self", "summary": "SUSE Bug 1003866", "url": "https://bugzilla.suse.com/1003866" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005857", "url": "https://bugzilla.suse.com/1005857" }, { "category": "self", "summary": "SUSE Bug 1005877", "url": "https://bugzilla.suse.com/1005877" }, { "category": "self", "summary": "SUSE Bug 1005896", "url": "https://bugzilla.suse.com/1005896" }, { "category": "self", "summary": "SUSE Bug 1005903", "url": "https://bugzilla.suse.com/1005903" }, { "category": "self", "summary": "SUSE Bug 1006917", "url": "https://bugzilla.suse.com/1006917" }, { "category": "self", "summary": "SUSE Bug 1006919", "url": "https://bugzilla.suse.com/1006919" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 1008557", "url": "https://bugzilla.suse.com/1008557" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008893", "url": "https://bugzilla.suse.com/1008893" }, { "category": "self", "summary": "SUSE Bug 1009875", "url": "https://bugzilla.suse.com/1009875" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010175", "url": "https://bugzilla.suse.com/1010175" }, { "category": "self", "summary": "SUSE Bug 1010201", "url": "https://bugzilla.suse.com/1010201" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012411", "url": "https://bugzilla.suse.com/1012411" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1012851", "url": "https://bugzilla.suse.com/1012851" }, { "category": "self", "summary": "SUSE Bug 1012917", "url": "https://bugzilla.suse.com/1012917" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013042", "url": "https://bugzilla.suse.com/1013042" }, { "category": "self", "summary": "SUSE Bug 1013070", "url": "https://bugzilla.suse.com/1013070" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013533", "url": "https://bugzilla.suse.com/1013533" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1013604", "url": "https://bugzilla.suse.com/1013604" }, { "category": "self", "summary": "SUSE Bug 1014410", "url": "https://bugzilla.suse.com/1014410" }, { "category": "self", "summary": "SUSE Bug 1014454", "url": "https://bugzilla.suse.com/1014454" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1015561", "url": "https://bugzilla.suse.com/1015561" }, { "category": "self", "summary": "SUSE Bug 1015752", "url": "https://bugzilla.suse.com/1015752" }, { "category": "self", "summary": "SUSE Bug 1015760", "url": "https://bugzilla.suse.com/1015760" }, { "category": "self", "summary": "SUSE Bug 1015796", "url": "https://bugzilla.suse.com/1015796" }, { "category": "self", "summary": "SUSE Bug 1015803", "url": "https://bugzilla.suse.com/1015803" }, { "category": "self", "summary": "SUSE Bug 1015817", "url": "https://bugzilla.suse.com/1015817" }, { "category": "self", "summary": "SUSE Bug 1015828", "url": "https://bugzilla.suse.com/1015828" }, { "category": "self", "summary": "SUSE Bug 1015844", "url": "https://bugzilla.suse.com/1015844" }, { "category": "self", "summary": "SUSE Bug 1015848", "url": "https://bugzilla.suse.com/1015848" }, { "category": "self", "summary": "SUSE Bug 1015878", "url": "https://bugzilla.suse.com/1015878" }, { "category": "self", "summary": "SUSE Bug 1015932", "url": "https://bugzilla.suse.com/1015932" }, { "category": "self", "summary": "SUSE Bug 1016320", "url": "https://bugzilla.suse.com/1016320" }, { "category": "self", "summary": "SUSE Bug 1016505", "url": "https://bugzilla.suse.com/1016505" }, { "category": "self", "summary": "SUSE Bug 1016520", "url": "https://bugzilla.suse.com/1016520" }, { "category": "self", "summary": "SUSE Bug 1016668", "url": "https://bugzilla.suse.com/1016668" }, { "category": "self", "summary": "SUSE Bug 1016688", "url": "https://bugzilla.suse.com/1016688" }, { "category": "self", "summary": "SUSE Bug 1016824", "url": "https://bugzilla.suse.com/1016824" }, { "category": "self", "summary": "SUSE Bug 1016831", "url": "https://bugzilla.suse.com/1016831" }, { "category": "self", "summary": "SUSE Bug 1017686", "url": "https://bugzilla.suse.com/1017686" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019165", "url": "https://bugzilla.suse.com/1019165" }, { "category": "self", "summary": "SUSE Bug 1019348", "url": "https://bugzilla.suse.com/1019348" }, { "category": "self", "summary": "SUSE Bug 1019783", "url": "https://bugzilla.suse.com/1019783" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 748806", "url": "https://bugzilla.suse.com/748806" }, { "category": "self", "summary": "SUSE Bug 763198", "url": "https://bugzilla.suse.com/763198" }, { "category": "self", "summary": "SUSE Bug 771065", "url": "https://bugzilla.suse.com/771065" }, { "category": "self", "summary": "SUSE Bug 786036", "url": "https://bugzilla.suse.com/786036" }, { "category": "self", "summary": "SUSE Bug 790588", "url": "https://bugzilla.suse.com/790588" }, { "category": "self", "summary": "SUSE Bug 795297", "url": "https://bugzilla.suse.com/795297" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 800999", "url": "https://bugzilla.suse.com/800999" }, { "category": "self", "summary": "SUSE Bug 803320", "url": "https://bugzilla.suse.com/803320" }, { "category": "self", "summary": "SUSE Bug 821612", "url": "https://bugzilla.suse.com/821612" }, { "category": "self", "summary": "SUSE Bug 824171", "url": "https://bugzilla.suse.com/824171" }, { "category": "self", "summary": "SUSE Bug 851603", "url": "https://bugzilla.suse.com/851603" }, { "category": "self", "summary": "SUSE Bug 853052", "url": "https://bugzilla.suse.com/853052" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 865783", "url": "https://bugzilla.suse.com/865783" }, { "category": "self", "summary": "SUSE Bug 871728", "url": "https://bugzilla.suse.com/871728" }, { "category": "self", "summary": "SUSE Bug 901809", "url": "https://bugzilla.suse.com/901809" }, { "category": "self", "summary": "SUSE Bug 907611", "url": "https://bugzilla.suse.com/907611" }, { "category": "self", "summary": "SUSE Bug 908458", "url": "https://bugzilla.suse.com/908458" }, { "category": "self", "summary": "SUSE Bug 908684", "url": "https://bugzilla.suse.com/908684" }, { "category": "self", "summary": "SUSE Bug 909077", "url": "https://bugzilla.suse.com/909077" }, { "category": "self", "summary": "SUSE Bug 909350", "url": "https://bugzilla.suse.com/909350" }, { "category": "self", "summary": "SUSE Bug 909484", "url": "https://bugzilla.suse.com/909484" }, { "category": "self", "summary": "SUSE Bug 909491", "url": "https://bugzilla.suse.com/909491" }, { "category": "self", "summary": "SUSE Bug 909618", "url": "https://bugzilla.suse.com/909618" }, { "category": "self", "summary": "SUSE Bug 913387", "url": "https://bugzilla.suse.com/913387" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 919382", "url": "https://bugzilla.suse.com/919382" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 924708", "url": "https://bugzilla.suse.com/924708" }, { "category": "self", "summary": "SUSE Bug 925065", "url": "https://bugzilla.suse.com/925065" }, { "category": "self", "summary": "SUSE Bug 928138", "url": "https://bugzilla.suse.com/928138" }, { "category": "self", "summary": "SUSE Bug 929141", "url": "https://bugzilla.suse.com/929141" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 961589", "url": "https://bugzilla.suse.com/961589" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 973203", "url": "https://bugzilla.suse.com/973203" }, { "category": "self", "summary": "SUSE Bug 973691", "url": "https://bugzilla.suse.com/973691" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 986337", "url": "https://bugzilla.suse.com/986337" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989680", "url": "https://bugzilla.suse.com/989680" }, { "category": "self", "summary": "SUSE Bug 989764", "url": "https://bugzilla.suse.com/989764" }, { "category": "self", "summary": "SUSE Bug 989896", "url": "https://bugzilla.suse.com/989896" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 992991", "url": "https://bugzilla.suse.com/992991" }, { "category": "self", "summary": "SUSE Bug 993739", "url": "https://bugzilla.suse.com/993739" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996541", "url": "https://bugzilla.suse.com/996541" }, { "category": "self", "summary": "SUSE Bug 996557", "url": "https://bugzilla.suse.com/996557" }, { "category": "self", "summary": "SUSE Bug 997401", "url": "https://bugzilla.suse.com/997401" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 999101", "url": "https://bugzilla.suse.com/999101" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6368 page", "url": "https://www.suse.com/security/cve/CVE-2013-6368/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9794 page", "url": "https://www.suse.com/security/cve/CVE-2016-9794/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-04-25T14:34:26Z", "generator": { "date": "2017-04-25T14:34:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1102-1", "initial_release_date": "2017-04-25T14:34:26Z", "revision_history": [ { "date": "2017-04-25T14:34:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-68.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-68.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-6368", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6368" } ], "notes": [ { "category": "general", "text": "The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6368", "url": "https://www.suse.com/security/cve/CVE-2013-6368" }, { "category": "external", "summary": "SUSE Bug 853052 for CVE-2013-6368", "url": "https://bugzilla.suse.com/853052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2013-6368" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-9576" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9794", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9794" } ], "notes": [ { "category": "general", "text": "Race condition in the snd_pcm_period_elapsed function in sound/core/pcm_lib.c in the ALSA subsystem in the Linux kernel before 4.7 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted SNDRV_PCM_TRIGGER_START command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9794", "url": "https://www.suse.com/security/cve/CVE-2016-9794" }, { "category": "external", "summary": "SUSE Bug 1013533 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013533" }, { "category": "external", "summary": "SUSE Bug 1013543 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013543" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9794", "url": "https://bugzilla.suse.com/1013604" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "important" } ], "title": "CVE-2016-9794" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-68.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-68.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-04-25T14:34:26Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
ghsa-26qg-wc7f-8867
Vulnerability from github
Published
2022-05-13 01:05
Modified
2022-05-13 01:05
Severity ?
VLAI Severity ?
Details
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
{ "affected": [], "aliases": [ "CVE-2016-5696" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-08-06T20:59:00Z", "severity": "MODERATE" }, "details": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "id": "GHSA-26qg-wc7f-8867", "modified": "2022-05-13T01:05:08Z", "published": "2022-05-13T01:05:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "type": "WEB", "url": "https://github.com/Gnoxter/mountain_goat" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "type": "WEB", "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" }, { "type": "WEB", "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "type": "WEB", "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91704" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036625" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3072-2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "type": "CVSS_V3" } ] }
gsd-2016-5696
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-5696", "description": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "id": "GSD-2016-5696", "references": [ "https://www.suse.com/security/cve/CVE-2016-5696.html", "https://www.debian.org/security/2016/dsa-3659", "https://access.redhat.com/errata/RHSA-2016:1939", "https://access.redhat.com/errata/RHSA-2016:1815", "https://access.redhat.com/errata/RHSA-2016:1814", "https://access.redhat.com/errata/RHSA-2016:1664", "https://access.redhat.com/errata/RHSA-2016:1657", "https://access.redhat.com/errata/RHSA-2016:1633", "https://access.redhat.com/errata/RHSA-2016:1632", "https://access.redhat.com/errata/RHSA-2016:1631", "https://ubuntu.com/security/CVE-2016-5696", "https://advisories.mageia.org/CVE-2016-5696.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-5696.html", "https://linux.oracle.com/cve/CVE-2016-5696.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-5696" ], "details": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "id": "GSD-2016-5696", "modified": "2023-12-13T01:21:25.478907Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "https://github.com/Gnoxter/mountain_goat", "refsource": "MISC", "url": "https://github.com/Gnoxter/mountain_goat" }, { "name": "USN-3070-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "name": "RHSA-2016:1657", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa131", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "name": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "RHSA-2016:1814", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "name": "http://source.android.com/security/bulletin/2016-10-01.html", "refsource": "CONFIRM", "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "name": "91704", "refsource": "BID", "url": "http://www.securityfocus.com/bid/91704" }, { "name": "USN-3070-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "name": "USN-3070-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "name": "RHSA-2016:1815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "name": "RHSA-2016:1939", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "name": "USN-3071-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "name": "RHSA-2016:1632", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "name": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf", "refsource": "MISC", "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "USN-3070-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "name": "1036625", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036625" }, { "name": "RHSA-2016:1631", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "name": "USN-3072-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "name": "RHSA-2016:1633", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "name": "RHSA-2016:1664", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "name": "USN-3072-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "name": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html", "refsource": "MISC", "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "name": "[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "name": "USN-3071-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-5696", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.6.6", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5696" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708", "refsource": "CONFIRM", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "name": "[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "name": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html", "refsource": "MISC", "tags": [ "Technical Description" ], "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "https://github.com/Gnoxter/mountain_goat", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gnoxter/mountain_goat" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "http://source.android.com/security/bulletin/2016-10-01.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "name": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf", "refsource": "MISC", "tags": [ "Technical Description" ], "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "name": "USN-3072-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "name": "USN-3071-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "name": "RHSA-2016:1657", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "name": "91704", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/91704" }, { "name": "1036625", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1036625" }, { "name": "USN-3070-3", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "name": "USN-3070-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "name": "RHSA-2016:1633", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "name": "RHSA-2016:1631", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "name": "RHSA-2016:1632", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "name": "USN-3072-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "name": "USN-3070-4", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "name": "RHSA-2016:1664", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "name": "USN-3070-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "name": "RHSA-2016:1814", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "name": "RHSA-2016:1815", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "name": "USN-3071-2", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "name": "https://bto.bluecoat.com/security-advisory/sa131", "refsource": "CONFIRM", "tags": [], "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "name": "RHSA-2016:1939", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-5696", "refsource": "CONFIRM", "tags": [], "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23", "refsource": "MISC", "tags": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 2.5 } }, "lastModifiedDate": "2021-11-17T22:15Z", "publishedDate": "2016-08-06T20:59Z" } } }
rhsa-2016:1633
Vulnerability from csaf_redhat
Published
2016-08-18 20:06
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
It was found that the RFC 5961 challenge ACK rate limiting as implemented
in the Linux kernel's networking subsystem allowed an off-path attacker to
leak certain information about a given connection by creating congestion on
the global challenge ACK rate limit counter and then measuring the changes
by probing packets. An off-path attacker could use this flaw to either
terminate TCP connection and/or inject payload into non-secured TCP
connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Yue Cao from Cyber Security Group in the CS department of University of California, Riverside, for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nIt was found that the RFC 5961 challenge ACK rate limiting as implemented \nin the Linux kernel\u0027s networking subsystem allowed an off-path attacker to \nleak certain information about a given connection by creating congestion on \nthe global challenge ACK rate limit counter and then measuring the changes \nby probing packets. An off-path attacker could use this flaw to either \nterminate TCP connection and/or inject payload into non-secured TCP \nconnection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Yue Cao from Cyber Security Group in the CS department of University of California, Riverside, for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1633", "url": "https://access.redhat.com/errata/RHSA-2016:1633" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1633.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:21+00:00", "generator": { "date": "2025-08-02T01:06:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1633", "initial_release_date": "2016-08-18T20:06:50+00:00", "revision_history": [ { "date": "2016-08-18T20:06:50+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-18T20:06:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64", "product_id": "perf-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.28.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.28.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64", "product_id": "perf-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.28.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.28.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "perf-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.28.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.28.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.28.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.28.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.28.3.el7.src", "product": { "name": "kernel-0:3.10.0-327.28.3.el7.src", "product_id": "kernel-0:3.10.0-327.28.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.28.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "perf-0:3.10.0-327.28.3.el7.s390x", "product_id": "perf-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x", "product_id": "python-perf-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.28.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.28.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.28.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.28.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-18T20:06:50+00:00", "details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1633" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.28.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.28.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.28.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.28.3.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1657
Vulnerability from csaf_redhat
Published
2016-08-23 16:11
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important)
* A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important)
* A flaw was found in the implementation of the Linux kernel's handling of networking challenge ack where an attacker is able to determine the shared counter which could be used to determine sequence numbers for TCP stream injection. (CVE-2016-5696, Important)
Red Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important)\n\n* A flaw was found in the way certain interfaces of the Linux kernel\u0027s Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important)\n\n* A flaw was found in the implementation of the Linux kernel\u0027s handling of networking challenge ack where an attacker is able to determine the shared counter which could be used to determine sequence numbers for TCP stream injection. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696. The CVE-2016-4470 issue was discovered by David Howells (Red Hat Inc.).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1657", "url": "https://access.redhat.com/errata/RHSA-2016:1657" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1310570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570" }, { "category": "external", "summary": "1341716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1657.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:36:22+00:00", "generator": { "date": "2025-08-02T01:36:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1657", "initial_release_date": "2016-08-23T16:11:31+00:00", "revision_history": [ { "date": "2016-08-23T16:11:31+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-23T16:11:31+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.40.1.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.40.1.ael7b.ppc64le", "product": { "name": "perf-0:3.10.0-229.40.1.ael7b.ppc64le", "product_id": "perf-0:3.10.0-229.40.1.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.40.1.ael7b?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.40.1.ael7b?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "product": { "name": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "product_id": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.40.1.ael7b?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.40.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.40.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-229.40.1.ael7b.src", "product": { "name": "kernel-0:3.10.0-229.40.1.ael7b.src", "product_id": "kernel-0:3.10.0-229.40.1.ael7b.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.40.1.ael7b?arch=src" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.40.1.el7.src", "product": { "name": "kernel-0:3.10.0-229.40.1.el7.src", "product_id": "kernel-0:3.10.0-229.40.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.40.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-229.40.1.el7.ppc64", "product_id": "perf-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.40.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.40.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-229.40.1.el7.x86_64", "product_id": "perf-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.40.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.40.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-229.40.1.el7.s390x", "product_id": "python-perf-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "perf-0:3.10.0-229.40.1.el7.s390x", "product_id": "perf-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.40.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-229.40.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.src", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.ael7b.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src" }, "product_reference": "kernel-0:3.10.0-229.40.1.ael7b.src", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "perf-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.src", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.40.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.40.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.40.1.ael7b.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src" }, "product_reference": "kernel-0:3.10.0-229.40.1.ael7b.src", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "perf-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "David Howells" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4470", "cwe": { "id": "CWE-253", "name": "Incorrect Check of Function Return Value" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341716" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix\nthis issue have been shipped now.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "RHBZ#1341716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4470", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470" } ], "release_date": "2016-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-23T16:11:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1657" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path" }, { "acknowledgments": [ { "names": [ "Jann Horn" ] } ], "cve": "CVE-2016-4565", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2016-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310570" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way certain interfaces of the Linux kernel\u0027s Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "RHBZ#1310570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4565" } ], "release_date": "2016-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-23T16:11:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1657" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko" }, { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-23T16:11:31+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1657" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.40.1.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.40.1.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.40.1.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.40.1.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.40.1.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.40.1.ael7b.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1815
Vulnerability from csaf_redhat
Published
2016-09-06 10:17
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue.
Bug Fix(es):
* When an interrupt request occurred and the new API was scheduled on a different CPU, the enic driver previously generated a warning message. This behavior was caused by a race condition between the vnic_intr_unmask() function and the enic_poll_unlock_napi() function. This update fixes the napi_poll() function to unlock before unmasking the interrupt. As a result, the warning message no longer occurs in the described situation. (BZ#1351192)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue.\n\nBug Fix(es):\n\n* When an interrupt request occurred and the new API was scheduled on a different CPU, the enic driver previously generated a warning message. This behavior was caused by a race condition between the vnic_intr_unmask() function and the enic_poll_unlock_napi() function. This update fixes the napi_poll() function to unlock before unmasking the interrupt. As a result, the warning message no longer occurs in the described situation. (BZ#1351192)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1815", "url": "https://access.redhat.com/errata/RHSA-2016:1815" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1815.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:28+00:00", "generator": { "date": "2025-08-02T01:06:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1815", "initial_release_date": "2016-09-06T10:17:59+00:00", "revision_history": [ { "date": "2016-09-06T10:17:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-06T10:17:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.34.1.el6.x86_64", "product_id": "perf-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.34.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.34.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.34.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.34.1.el6.i686", "product_id": "python-perf-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.34.1.el6.i686", "product": { "name": "perf-0:2.6.32-573.34.1.el6.i686", "product_id": "perf-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.34.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.34.1.el6.i686", "product": { "name": "kernel-0:2.6.32-573.34.1.el6.i686", "product_id": "kernel-0:2.6.32-573.34.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.34.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.34.1.el6.ppc64", "product_id": "perf-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.34.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.34.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.34.1.el6.s390x", "product_id": "python-perf-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "perf-0:2.6.32-573.34.1.el6.s390x", "product_id": "perf-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.34.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.34.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.34.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.34.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.34.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.34.1.el6.src", "product": { "name": "kernel-0:2.6.32-573.34.1.el6.src", "product_id": "kernel-0:2.6.32-573.34.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.34.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-06T10:17:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1815" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.34.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.34.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.34.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1631
Vulnerability from csaf_redhat
Published
2016-08-18 18:22
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: realtime-kernel security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
It was found that the RFC 5961 challenge ACK rate limiting as implemented
in the Linux kernel's networking subsystem allowed an off-path attacker to
leak certain information about a given connection by creating congestion on
the global challenge ACK rate limit counter and then measuring the changes
by probing packets. An off-path attacker could use this flaw to either
terminate TCP connection and/or inject payload into non-secured TCP
connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Yue Cao from Cyber Security Group in the CS
department of University of California, Riverside, for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nIt was found that the RFC 5961 challenge ACK rate limiting as implemented \nin the Linux kernel\u0027s networking subsystem allowed an off-path attacker to \nleak certain information about a given connection by creating congestion on \nthe global challenge ACK rate limit counter and then measuring the changes \nby probing packets. An off-path attacker could use this flaw to either \nterminate TCP connection and/or inject payload into non-secured TCP \nconnection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Yue Cao from Cyber Security Group in the CS\ndepartment of University of California, Riverside, for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1631", "url": "https://access.redhat.com/errata/RHSA-2016:1631" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1631.json" } ], "title": "Red Hat Security Advisory: realtime-kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:32+00:00", "generator": { "date": "2025-08-02T01:06:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1631", "initial_release_date": "2016-08-18T18:22:19+00:00", "revision_history": [ { "date": "2016-08-18T18:22:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-18T18:22:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.rt56.195.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-327.rt56.195.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.rt56.195.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "product_id": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.195.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-18T18:22:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1631" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.195.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.195.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.195.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.195.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1814
Vulnerability from csaf_redhat
Published
2016-09-06 09:59
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important)
* It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696.
Bug Fix(es):
* After upgrading the kernel, CPU load average increased compared to the prior kernel version due to the modification of the scheduler. The provided patchset makes the calculation algorithm of this load average roll back to the status of the previous system version thus resulting in relatively lower values in the same system load. (BZ#1343010)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw was found in the way certain interfaces of the Linux kernel\u0027s Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important)\n\n* It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Jann Horn for reporting CVE-2016-4565 and Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting CVE-2016-5696.\n\nBug Fix(es):\n\n* After upgrading the kernel, CPU load average increased compared to the prior kernel version due to the modification of the scheduler. The provided patchset makes the calculation algorithm of this load average roll back to the status of the previous system version thus resulting in relatively lower values in the same system load. (BZ#1343010)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1814", "url": "https://access.redhat.com/errata/RHSA-2016:1814" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1310570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1814.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:35+00:00", "generator": { "date": "2025-08-02T01:06:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1814", "initial_release_date": "2016-09-06T09:59:05+00:00", "revision_history": [ { "date": "2016-09-06T09:59:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-06T09:59:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.73.2.el6.x86_64", "product_id": "perf-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.73.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-431.73.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.73.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.73.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.73.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.73.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.73.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.73.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.73.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.73.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.73.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.73.2.el6.src", "product": { "name": "kernel-0:2.6.32-431.73.2.el6.src", "product_id": "kernel-0:2.6.32-431.73.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.73.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.73.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.73.2.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.73.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.73.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.73.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.73.2.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.73.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.73.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jann Horn" ] } ], "cve": "CVE-2016-4565", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2016-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310570" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way certain interfaces of the Linux kernel\u0027s Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "RHBZ#1310570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4565" } ], "release_date": "2016-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-06T09:59:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1814" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko" }, { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-06T09:59:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1814" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.73.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.73.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.73.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1632
Vulnerability from csaf_redhat
Published
2016-08-18 18:22
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
It was found that the RFC 5961 challenge ACK rate limiting as implemented
in the Linux kernel's networking subsystem allowed an off-path attacker to
leak certain information about a given connection by creating congestion on
the global challenge ACK rate limit counter and then measuring the changes
by probing packets. An off-path attacker could use this flaw to either
terminate TCP connection and/or inject payload into non-secured TCP
connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Yue Cao from Cyber Security Group in the CS
department of University of California, Riverside, for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nIt was found that the RFC 5961 challenge ACK rate limiting as implemented \nin the Linux kernel\u0027s networking subsystem allowed an off-path attacker to \nleak certain information about a given connection by creating congestion on \nthe global challenge ACK rate limit counter and then measuring the changes \nby probing packets. An off-path attacker could use this flaw to either \nterminate TCP connection and/or inject payload into non-secured TCP \nconnection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Yue Cao from Cyber Security Group in the CS\ndepartment of University of California, Riverside, for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1632", "url": "https://access.redhat.com/errata/RHSA-2016:1632" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1632.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:28+00:00", "generator": { "date": "2025-08-02T01:06:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1632", "initial_release_date": "2016-08-18T18:22:09+00:00", "revision_history": [ { "date": "2016-08-18T18:22:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-18T18:22:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-327.28.3.rt56.235.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.28.3.rt56.235.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "product": { "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "product_id": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.28.3.rt56.235.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-18T18:22:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1632" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.28.3.rt56.235.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.28.3.rt56.235.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.28.3.rt56.235.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1664
Vulnerability from csaf_redhat
Published
2016-08-23 18:34
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue.
Bug Fix(es):
* When loading the Direct Rendering Manager (DRM) kernel module, the kernel panicked if DRM was previously unloaded. The kernel panic was caused by a memory leak of the ID Resolver (IDR2). With this update, IDR2 is loaded during kernel boot, and the kernel panic no longer occurs in the described scenario. (BZ#1353827)
* When more than one process attempted to use the "configfs" directory entry at the same time, a kernel panic in some cases occurred. With this update, a race condition between a directory entry and a lookup operation has been fixed. As a result, the kernel no longer panics in the described scenario. (BZ#1353828)
* When shutting down the system by running the halt -p command, a kernel panic occurred due to a conflict between the kernel offlining CPUs and the sched command, which used the sched group and the sched domain data without first checking the data. The underlying source code has been fixed by adding a check to avoid the conflict. As a result, the described scenario no longer results in a kernel panic. (BZ#1343894)
* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. (BZ#1355980)
* Previously, multiple Very Secure FTP daemon (vsftpd) processes on a directory with a large number of files led to a high contention rate on each inode's spinlock, which caused excessive CPU usage. With this update, a spinlock to protect a single memory-to-memory copy has been removed from the ext4_getattr() function. As a result, system CPU usage has been reduced and is no longer excessive in the described situation. (BZ#1355981)
* When the gfs2_grow utility is used to extend Global File System 2 (GFS2), the next block allocation causes the GFS2 kernel module to re-read its resource group index. If multiple processes in the GFS2 module raced to do the same thing, one process sometimes overwrote a valid object pointer with an invalid pointer, which caused either a kernel panic or a file system corruption. This update ensures that the resource group object pointer is not overwritten. As a result, neither kernel panic nor file system corruption occur in the described scenario. (BZ#1347539)
* Previously, the SCSI Remote Protocol over InfiniBand (IB-SRP) was disabled due to a bug in the srp_queue() function. As a consequence, an attempt to enable the Remote Direct Memory Access (RDMA) at boot caused the kernel to crash. With this update, srp_queue() has been fixed, and the system now boots as expected when RDMA is enabled. (BZ#1348062)
Enhancement(s):
* This update optimizes the efficiency of the Transmission Control Protocol (TCP) when the peer is using a window under 537 bytes in size. As a result, devices that use maximum segment size (MSS) of 536 bytes or fewer will experience improved network performance. (BZ#1354446)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nIt was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue.\n\nBug Fix(es):\n\n* When loading the Direct Rendering Manager (DRM) kernel module, the kernel panicked if DRM was previously unloaded. The kernel panic was caused by a memory leak of the ID Resolver (IDR2). With this update, IDR2 is loaded during kernel boot, and the kernel panic no longer occurs in the described scenario. (BZ#1353827)\n\n* When more than one process attempted to use the \"configfs\" directory entry at the same time, a kernel panic in some cases occurred. With this update, a race condition between a directory entry and a lookup operation has been fixed. As a result, the kernel no longer panics in the described scenario. (BZ#1353828)\n\n* When shutting down the system by running the halt -p command, a kernel panic occurred due to a conflict between the kernel offlining CPUs and the sched command, which used the sched group and the sched domain data without first checking the data. The underlying source code has been fixed by adding a check to avoid the conflict. As a result, the described scenario no longer results in a kernel panic. (BZ#1343894)\n\n* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. (BZ#1355980)\n\n* Previously, multiple Very Secure FTP daemon (vsftpd) processes on a directory with a large number of files led to a high contention rate on each inode\u0027s spinlock, which caused excessive CPU usage. With this update, a spinlock to protect a single memory-to-memory copy has been removed from the ext4_getattr() function. As a result, system CPU usage has been reduced and is no longer excessive in the described situation. (BZ#1355981)\n\n* When the gfs2_grow utility is used to extend Global File System 2 (GFS2), the next block allocation causes the GFS2 kernel module to re-read its resource group index. If multiple processes in the GFS2 module raced to do the same thing, one process sometimes overwrote a valid object pointer with an invalid pointer, which caused either a kernel panic or a file system corruption. This update ensures that the resource group object pointer is not overwritten. As a result, neither kernel panic nor file system corruption occur in the described scenario. (BZ#1347539)\n\n* Previously, the SCSI Remote Protocol over InfiniBand (IB-SRP) was disabled due to a bug in the srp_queue() function. As a consequence, an attempt to enable the Remote Direct Memory Access (RDMA) at boot caused the kernel to crash. With this update, srp_queue() has been fixed, and the system now boots as expected when RDMA is enabled. (BZ#1348062)\n\nEnhancement(s):\n\n* This update optimizes the efficiency of the Transmission Control Protocol (TCP) when the peer is using a window under 537 bytes in size. As a result, devices that use maximum segment size (MSS) of 536 bytes or fewer will experience improved network performance. (BZ#1354446)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1664", "url": "https://access.redhat.com/errata/RHSA-2016:1664" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1664.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:03+00:00", "generator": { "date": "2025-08-02T01:06:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1664", "initial_release_date": "2016-08-23T18:34:45+00:00", "revision_history": [ { "date": "2016-08-23T18:34:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-23T18:34:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.4.2.el6.i686", "product": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686", "product_id": "python-perf-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "product_id": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.4.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.4.2.el6.i686", "product": { "name": "perf-0:2.6.32-642.4.2.el6.i686", "product_id": "perf-0:2.6.32-642.4.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.4.2.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64", "product_id": "perf-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.4.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.4.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "product_id": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64", "product_id": "perf-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.4.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-642.4.2.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x", "product_id": "python-perf-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "perf-0:2.6.32-642.4.2.el6.s390x", "product_id": "perf-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.4.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "product_id": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.4.2.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-642.4.2.el6.src", "product": { "name": "kernel-0:2.6.32-642.4.2.el6.src", "product_id": "kernel-0:2.6.32-642.4.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.4.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-642.4.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-642.4.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-642.4.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-23T18:34:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1664" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.4.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.4.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.4.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
rhsa-2016:1939
Vulnerability from csaf_redhat
Published
2016-09-27 14:16
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)
Red Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue.
Bug Fix(es):
* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode->npages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365163)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network. (CVE-2016-5696, Important)\n\nRed Hat would like to thank Yue Cao (Cyber Security Group of the CS department of University of California in Riverside) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode-\u003enpages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365163)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1939", "url": "https://access.redhat.com/errata/RHSA-2016:1939" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1939.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:06:42+00:00", "generator": { "date": "2025-08-02T01:06:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1939", "initial_release_date": "2016-09-27T14:16:52+00:00", "revision_history": [ { "date": "2016-09-27T14:16:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-27T14:16:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-504.52.1.el6.ppc64", "product_id": "perf-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.52.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.52.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-504.52.1.el6.ppc64", "product_id": "kernel-0:2.6.32-504.52.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.52.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-504.52.1.el6.s390x", "product_id": "python-perf-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "perf-0:2.6.32-504.52.1.el6.s390x", "product_id": "perf-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-504.52.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.52.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-504.52.1.el6.s390x", "product_id": "kernel-0:2.6.32-504.52.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.52.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.52.1.el6.x86_64", "product_id": "perf-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.52.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.52.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.52.1.el6.x86_64", "product_id": "kernel-0:2.6.32-504.52.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.52.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.52.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-504.52.1.el6.i686", "product_id": "python-perf-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.52.1.el6.i686", "product": { "name": "perf-0:2.6.32-504.52.1.el6.i686", "product_id": "perf-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.52.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.52.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.52.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.52.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.52.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.52.1.el6.src", "product": { "name": "kernel-0:2.6.32-504.52.1.el6.src", "product_id": "kernel-0:2.6.32-504.52.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.52.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.src", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.src", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Yue Cao" ], "organization": "Cyber Security Group of the CS department of University of California in Riverside" } ], "cve": "CVE-2016-5696", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2016-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1354708" } ], "notes": [ { "category": "description", "text": "It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel\u0027s networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes by probing packets. An off-path attacker could use this flaw to either terminate TCP connection and/or inject payload into non-secured TCP connection between two endpoints on the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: challenge ACK counter information disclosure.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "RHBZ#1354708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5696", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5696" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5696" }, { "category": "external", "summary": "http://lwn.net/Articles/696868/", "url": "http://lwn.net/Articles/696868/" } ], "release_date": "2016-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-27T14:16:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1939" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.52.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.52.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.52.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: challenge ACK counter information disclosure." } ] }
fkie_cve-2016-5696
Vulnerability from fkie_nvd
Published
2016-08-06 20:59
Modified
2025-04-12 10:46
Severity ?
Summary
net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758 | Issue Tracking, Patch | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1631.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1632.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1633.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1657.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1664.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1814.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1815.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1939.html | ||
cve@mitre.org | http://source.android.com/security/bulletin/2016-10-01.html | Third Party Advisory | |
cve@mitre.org | http://www.openwall.com/lists/oss-security/2016/07/12/2 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | Vendor Advisory | |
cve@mitre.org | http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html | Technical Description | |
cve@mitre.org | http://www.securityfocus.com/bid/91704 | ||
cve@mitre.org | http://www.securitytracker.com/id/1036625 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3070-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3070-2 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3070-3 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3070-4 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3071-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3071-2 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3072-1 | ||
cve@mitre.org | http://www.ubuntu.com/usn/USN-3072-2 | ||
cve@mitre.org | https://bto.bluecoat.com/security-advisory/sa131 | ||
cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1354708 | Issue Tracking | |
cve@mitre.org | https://github.com/Gnoxter/mountain_goat | Exploit, Third Party Advisory | |
cve@mitre.org | https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758 | Issue Tracking, Patch | |
cve@mitre.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10167 | ||
cve@mitre.org | https://security.paloaltonetworks.com/CVE-2016-5696 | ||
cve@mitre.org | https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23 | ||
cve@mitre.org | https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf | Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758 | Issue Tracking, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1631.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1632.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1633.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1657.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1664.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1814.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1815.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1939.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://source.android.com/security/bulletin/2016-10-01.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/07/12/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html | Technical Description | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91704 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036625 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3070-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3070-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3070-3 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3070-4 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3071-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3071-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3072-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3072-2 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa131 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1354708 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Gnoxter/mountain_goat | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758 | Issue Tracking, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10167 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2016-5696 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf | Technical Description |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "matchCriteriaId": "595E33EF-6B21-425B-929C-6B883FA50081", "versionEndIncluding": "7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:vm_server:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "87AE59F3-F47B-424D-B5EB-40768018206D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:vm_server:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "45DC1391-1EFC-49D7-9DD5-D9D9C5DFE746", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "52847A0D-725D-40BB-B852-8937D886C0E1", "versionEndIncluding": "4.6.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack." }, { "lang": "es", "value": "net/ipv4/tcp_input.c en el kernel de Linux en versiones anteriores a 4.7 no determina adecuadamente la tasa de segmentos de desaf\u00edo ACK, lo que facilita a atacantes remotos secuestrar sesiones TCP a trav\u00e9s de un ataque ciego en ventana." } ], "id": "CVE-2016-5696", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-08-06T20:59:05.690", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/91704" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id/1036625" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "source": "cve@mitre.org", "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gnoxter/mountain_goat" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "source": "cve@mitre.org", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "source": "cve@mitre.org", "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "source": "cve@mitre.org", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" }, { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1631.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1632.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1633.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1657.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1664.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1814.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1815.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2016-1939.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://source.android.com/security/bulletin/2016-10-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/07/12/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "http://www.prnewswire.com/news-releases/mitnick-attack-reappears-at-geekpwn-macau-contest-300270779.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/91704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3070-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3070-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3070-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3070-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3071-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3071-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3072-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3072-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bto.bluecoat.com/security-advisory/sa131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1354708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gnoxter/mountain_goat" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/torvalds/linux/commit/75ff39ccc1bd5d3c455b6822ab09e533c551f758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.paloaltonetworks.com/CVE-2016-5696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1461-security-advisory-23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…